Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Version 1.6
May, 2017
www.korenix.com
1
Korenix JetNet 5428G Series
Rackmount Managed Ethernet Switch
User’s Manual
Copyright Notice
2
Federal Communications Commission (FCC) Statement
This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio frequency energy and, if
not installed and used in accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in a residential area is likely
to cause harmful interference in which case the user will be required to correct the interference
at his expense.
The user is cautioned that changes and modifications made to the equipment without approval
of the manufacturer could void the user’s authority to operate this equipment.
3
Index
1 Introduction ............................................................................................................2
1.1 Overview .................................................................................................... 2
1.2 Major Features ........................................................................................... 3
1.3 Package List ............................................................................................... 3
2 Hardware Installation .............................................................................................5
2.1 Hardware Introduction ............................................................................... 5
2.2 Wiring Power Inputs .................................................................................. 6
2.3 Wiring Earth Ground ................................................................................. 7
2.4 Wiring Fast Ethernet Ports ......................................................................... 7
2.5 Wiring Fiber Ports ...................................................................................... 8
2.6 Wiring Gigabit Combo Ports ..................................................................... 9
2.7 Wiring RS-232 Console Cable ................................................................... 9
2.8 Rack Mounting Installation........................................................................ 9
2.9 Safety Warming........................................................................................ 11
3 Preparation for Management................................................................................12
3.1 Preparation for Serial Console ................................................................. 12
3.2 Preparation for Web Interface .................................................................. 13
3.3 Preparation for Telnet Console ................................................................ 15
4 Feature Configuration ..........................................................................................18
4.1 Command Line Interface Introduction..................................................... 19
4.2 Basic Setting ............................................................................................ 24
4.3 Port Configuration ................................................................................... 45
4.4 Network Redundancy............................................................................... 55
4.5 VLAN ...................................................................................................... 73
4.6 Private VLAN .......................................................................................... 83
4.7 Traffic Prioritization................................................................................. 90
4.8 Multicast Filtering .................................................................................... 95
4.9 SNMP..................................................................................................... 101
4.10 Security .................................................................................................. 105
4.11 Warning .................................................................................................. 118
4.12 Monitor and Diag ................................................................................... 123
4.13 Device Front Panel ................................................................................. 139
4.14 Save to Flash .......................................................................................... 140
4.15 Logout .................................................................................................... 141
5 Appendix ............................................................................................................142
5.1 Pin Assignment of the RS-232 Console Cable ...................................... 142
5.2 Korenix SFP family ............................................................................... 143
5.3 Korenix Private MIB.............................................................................. 144
5.4 Revision History .................................................................................... 145
5.5 About Korenix ....................................................................................... 146
1
1 Introduction
Welcome to Korenix JetNet 5428G Rackmount Managed Ethernet Switch User Manual.
Following topics are covered in this chapter:
1.1 Overview
1.2 Major Features
1.3 Package Checklist
1.1 Overview
The JetNet 5428G Series, the 19-inch 24+4G Managed Ethernet Ring Switch includes
JetNet 5428G, JetNet 5428G-DC and JetNet 5428G-2G-2FX.
The JetNet 5428G/5428G-DC, is equipped with 24 10/100 Base-TX ports plus 4 Gigabit
RJ45 / MINI GBIC combo ports. The 5428G-2G-2FX is equipped with 24 10/100 Base-TX
ports, 2 100M/Gigabit SFP plus 2 Gigabit RJ45/SFP combo ports. JetNet 5428G Series is a
special design for control rooms where high-port density and performance are required. The
2/4 Gigabit Combo port design allows 10/100/1000 triple speed of copper ports, and the
SFP ports accept all types of Gigabit SFP transceivers, including Gigabit SX, LX, LHX, ZX
and XD for several connections and distances. Additionally, the last 2 SFP ports of JetNet
5428G-2G-2FX can support 100Base-FX and Gigabit SFP transceivers.
The device is mounted within the 19 inch rack, along with other 19 inch public servers or
other network devices. When the lower industrial switches are aggregated to the JetNet
5428G, the 24+4G design allows connecting up to 12 100M rings plus 2 Gigabit rings. Each
of the ring has its own ring redundancy protection. This is a unique and Korenix patent
protected ring technology.
JetNet 5428G is designed as a fan-less rackmount switch with low power consumption
and wide operating temperature. JetNet 5428G-DC, the DC input model, allows 24V
2
(12-48V) DC input. JetNet 5428G supports Jumbo frame featuring up to 9,216 bytes packet
size for large size file transmission. This is the trend for future industrial application
requests.
The embedded software supports RSTP and Multiple Super Ring technology for ring
redundancy protection. Full layer 2 management features include VLAN, IGMP Snooping,
LACP for network control, SNMP, LLDP for network management. Secured access is
protected by Port Security, 802.1x and flexible Layer 2/4 Access Control List. With JetNet
5428G, you can fulfill the technicians’ need of having best solution for the industrial Ethernet
infrastructure.
• 24-port 10/100 Base-TX and 4-port Gigabit RJ-45/SFP combo ports (10/100/1000
Base-TX, 1000Base-X) (JetNet 5428G/5428G-DC)
• 24-port 10/100 Base-TX, 2-port Gigabit RJ-45/SFP combo ports (10/100/1000
Base-TX, 1000Base-X) and 2-port 100Base-FX/1000Base-X SFP ports. (JetNet
5428G-2G-2FX)
• Non-Blocking Switching Performance, no collision or delay when wire-speed
transmission
• Supports Jumbo Frame up to 9,216 byte
• RSTP and Multiple Super Ring (Rapid Super Ring, Rapid Dual Homing, MultiRing,
TrunkRing)
• Maximum 12 x 100M Rings plus 2 Gigabit Rings aggregation capability
• VLAN, LACP, GVRP, QoS, IGMP Snooping, Rate Control, Online Multi Port Mirroring
• Link Layer Discovery Protocol (LLDP), SNMP V1/V2c/V3, RMON and JetView
Discovering and Management
• Advanced Security supports IP/Port Security, 802.1x and Access Control List
• Event Notification by E-mail, SNMP Trap, Syslog and Relay Output
• Rigid Aluminum Case complies with IP31
• 90-264VAC or Dual 12-48VDC power input
Note: The detail spec is listed in latest datasheet. Please download the latest
datasheet in Korenix Web site.
Korenix JetNet 5428G Series products are shipped with following items:
3
JetNet 5428G 24+4G Rackmount Managed Ethernet Ring Switch
JetNet 5428G (no SFP transceivers)
Rack Mount Kit
Console Cable
Power Cord
Document CD
JetNet 5428G-DC 24+4G Rackmount Managed Ethernet Ring Switch with 12-48VDC
input
Includes:
JetNet 5428G-DC (no SFP transceivers)
Rack Mount Kit
Console Cable
Document CD
JetNet 5428G-2G-2FX 24+4G Rackmount Managed Ethernet Ring Switch
JetNet 5428G-2G-2FX (no SFP transceivers)
Rack Mount Kit
Console Cable
Power Cord
Document CD
100M&
100M Gigabit
Model Name Power Input Gigabit
Copper Combo
Fiber
If any of the above items are missing or damaged, please contact your local sales
representative.
4
2 Hardware Installation
Dimension
JetNet 5428G Industrial Modular Managed Ethernet Switch dimension (W x H x D) is
44mm(H) x 438mm (W) x 170mm (D)
5
Panel Layout
The front panel includes RS-232 Console Port, System & Port LEDs, Fast Ethernet Port
Interfaces and Gigabit Combo Port Interfaces.
The console port chooses RS-232 DB-9 types. The pin arrangement is “Pin2: TxD, Pin3:
RxD, Pin5:GND”. Korenix attached the console cable within the shipped box.
In the Rear panel, there are 2 types power input connector applied to JetNet 5428G and
JetNet 5428G-DC.
JetNet 5428G/5428G-2G-2FX chooses standard AC plug as power input socket.
JetNet 5428G-DC chooses 4-pin terminal block as power input socket. Follow the V+, V-
indication in the rear panel to screw the power source.
6
1. Insert positive and negative wires into V+ and V-
contacts respectively of the terminal block
connector
2. Tighten the wire-clamp screws to prevent DC
wires from being loosened.
3. Power 1 and Power 2 support power redundancy,
one of it failed, the other recovered.
4. Positive and negative power system inputs are
both accepted, but Power 1 and Power 2 must
apply the same mode.
Note 1: It is a good practice to turn off input and load power, and to unplug power terminal
block before making wire connections. Otherwise, your screwdriver blade can
inadvertently short your terminal connections to the grounded enclosure.
Note 2: The range of the suitable DC electric wire is from 12 to 24 AWG.
Note 3: Please follow the V+ and V- indicator to wire. Incorrect wiring would not damage
the switch. Incorrect wiring can not power on the switch.
Note 4: The DC1 and DC2 power status will be shown as DC power status due to the
integrated DC power design.
7
Straight-through Cabling Schematic Cross-over Cabling Schematic
Note that Ethernet cables use pins 1, 2, 3, and 6 of an 8-pin RJ-45 connector. The signals
of these pins are converted by the automatic MDI-X function, as shown in the table below:
Connect one side of an Ethernet cable into any switch port and connect the other side to
your attached device. The LNK LED will light up when the cable is correctly connected.
Refer to the LED Indicators section for descriptions of each LED indicator. Always make
sure that the cables between the switches and attached devices (e.g. switch, hub, or
workstation) are less than 100 meters (328 feet).
The wiring cable types are as below.
10Base-T: 2-pair UTP/STP Cat. 3, 4, 5 cable, EIA/TIA-568 100-ohm (100m)
100 Base-TX: 2-pair UTP/STP Cat. 5 cable, EIA/TIA-568 100-ohm (100m)
1000 Base-TX: 4-pair UTP/STP Cat. 5 cable, EIA/TIA-568 100-ohm (100m)
8
Below figure is the SFP plug-in and SFP Fiber Cable Plug-in Example.
Note: This is a Class 1 Laser/LED product. Don’t stare at the Laser/LED Beam.
9
(The picture is JetNet 5628G, the mounting method is the same.)
2.2.2 Mount the device in the 19’ rack by using four rack-mounting screws provided by
When installing multiple switches, mount them in the rack one below the other. It’s
requested to reserve 0.5U-1U free space for multiple switches installing in high
temperature environment. This is important to disperse the heat generated by the
switch.
10
2.9 Safety Warming
2.2.1 The Equipment intended for installation in a Restricted Access
Location.
2.2.2 The warning test is provided in user manual. Below is the information:
”For tilslutning af de ovrige ledere, se medfolgende installationsvejledning”.
“Laite on liitettava suojamaadoitus-koskettimilla varustettuun pistorasiaan”
„Apparatet ma tilkoples jordet stikkontakt“
”Apparaten skall anslutas till jordat uttag”
11
3 Preparation for Management
JetNet 5428G Rackmount Managed Switch provides both in-band and out-band
configuration methods. You can configure the switch via RS232 console cable if you
don’t attach your admin PC to your network, or if you lose network connection to your
JetNet 5428G. This is so-called out-band management. It wouldn’t be affected by
network performance.
The in-band management means you can remotely manage the switch via the network.
You can choose Telnet or Web-based management. You just need to know the device’s
IP address and you can remotely connect to its embedded HTTP web pages or Telnet
console.
Following topics are covered in this chapter:
3.1 Preparation for Serial Console
3.2 Preparation for Web Interface
3.3 Preparation for Telnet console
Booting...
Sun Jan 1 00:00:00 UTC 2006
Switch>
12
3.2 Preparation for Web Interface
JetNet 5428G provides HTTP Web Interface and Secured HTTPS Web Interface for
web management.
Click on Enter or OK. Welcome page of the web-based management interface will then
appear.
13
Once you enter the web-based management interface, you can freely change the
JetNet’s IP address to fit your network environment.
Note 1: IE 5.0 or later versions do not allow Java applets to open sockets by default.
Users have to directly modify the browser settings to selectively enable Java applets to
use network ports.
Note 2: The Web UI connection session of JetNet 5428G will be logged out
automatically if you don’t give any input after 30 seconds. After logged out, you should
re-login and key in correct user name and password again.
14
5. Key in the user name and the password. The default user name and password is
admin.
6. Click on Enter or OK. Welcome page of the web-based management interface will
then appear.
7. Once you enter the web-based management interface, all the commands you see
are the same as what you see by HTTP login.
15
Download PuTTY: http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Figure 0... After click on Open, then you can see the cipher information in the
popup screen. Press Yes to accept the Security Alert.
16
3. After few seconds, the SSH connection to JetNet 5428G is opened. You can see the
login screen as the below figure.
4. Type the Login Name and its Password. The default Login Name and Password are
admin / admin.
5. All the commands you see in SSH are the same as the CLI commands you see via
RS232 console. The next chapter will introduce in detail how to use command line to
configure the switch.
17
4 Feature Configuration
This chapter explains how to configure JetNet 5428G software features. There are four
ways to access the switch: Serial console, Telnet, Web browser and SNMP.
JetNet 5428G series Rackmount Managed Switch provides both in-band and out-band
configuration methods. You can configure the switch via RS232 console cable if you don’t
attach your admin PC to your network, or if you lose the network connection to your JetNet
5428G. This is so-called out-band management. It wouldn’t be affected by the network
performance.
The in-band management means you can remotely manage the switch via the network.
You can choose Telnet or Web-based management. You just need to know the device’s IP
address. Then you can remotely connect to its embedded HTML web pages or Telnet
console.
Korenix web management page is developed by JAVA. It allows you to use a standard
web-browser such as Microsoft Internet Explorer, or Mozila, to configure and interrogate
the switch from anywhere on the network.
Note: IE 5.0 or later versions do not allow Java applets to open sockets by default. Users
have to directly modify the browser settings to selectively enable Java applets to use
network ports.
18
4.1 Command Line Interface Introduction
The Command Line Interface (CLI) is the user interface to the switch’s embedded software
system. You can view the system information, show the status, configure the switch and
receive a response back from the system by keying in a command.
There are some different command modes. Each command mode has its own access
ability, available command lines and uses different command lines to enter and exit. These
modes are User EXEC, Privileged EXEC, Global Configuration, (Port/VLAN) Interface
Configuration modes.
User EXEC mode: As long as you login the switch by CLI. You are in the User EXEC mode.
You can ping, telnet remote device, and show some basic information.
Type enable to enter next mode, exit to logout. ? to see the command list
JN5428G>
enable Turn on privileged mode command
exit Exit current mode and down to previous mode
list Print command list
ping Send echo messages
quit Exit current mode and down to previous mode
show Show running system information
telnet Open a telnet connection
traceroute Trace route to destination
Privileged EXEC mode: Press enable in the User EXEC mode, then you can enter the
Privileged EXEC mode. In this mode, the system allows you to view current configuration,
reset default, reload switch, show system information, save configuration…and enter the
global configuration mode.
Type configure terminal to enter next mode, exit to leave. ? to see the command list
Switch#
archive manage archive files
clear Reset functions
clock Configure time-of-day clock
configure Configuration from vty interface
copy Copy from one file to another
debug Debugging functions (see also 'undebug')
disable Turn off privileged mode command
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
list Print command list
more Display the contents of a file
no Negate a command or set its defaults
ping Send echo messages
quit Exit current mode and down to previous mode
reboot Reboot system
reload copy a default-config file to replace the current one
show Show running system information
telnet Open a telnet connection
terminal Set terminal line parameters
traceroute Trace route to destination
write Write running configuration to memory, network, or terminal
19
Global Configuration Mode: Press configure terminal in privileged EXEC mode. You
can then enter global configuration mode. In global configuration mode, you can configure
all the features that the system provides you.
The port interface name for fast Ethernet port 1 is fa1,… fast Ethernet 7 is fa7, gigabit
Ethernet port 8 is gi8.. gigabit Ethernet port 10 is gi10. Type interface name accordingly
when you want to enter certain interface configuration mode.
20
Available command lists of the global configuration mode.
Type exit to leave the mode. Type ? to see the available command list.
21
Summary of the 5 command modes.
Mode
User EXEC This is the first level of access. Enter: Login successfully Switch>
Privileged In this mode, the system allows Enter: Type enable in User Switch#
configuration command.
configuration can configure all the features that terminal in privileged EXEC
Ctrl-Z to exit.
Port In this mode, you can configure Enter: Type interface IFNAME Switch(config-if)#
mode.
VLAN Interface In this mode, you can configure Enter: Type interface VLAN Switch(config-vlan)#
mode.
mode.
22
Here are some useful commands for you to see these available commands. Save your
time in typing and avoid typing error.
? To see all the available commands in this mode. It helps you to see the next command
you can/should type as well.
(Character)? To see all the available commands starts from this character.
Switch(config)# a?
access-list Add an access list entry
administrator Administrator account setting
arp Set a static ARP entry
Tab This tab key helps you to input the command quicker. If there is only one available
command in the next, clicking on tab key can help to finish typing soon.
Switch(config)# ac (tab)
Switch(config)# access-list
Alert message when multiple users want to configure the switch. If the administrator is in
configuration mode, then the Web users can’t change the settings. JetNet 5428G allows
only one administrator to configure the switch at a time.
23
4.2 Basic Setting
The Basic Setting group provides you to configure switch information, IP address, User
name/Password of the system. It also allows you to do firmware upgrade, backup and
restore configuration, reload factory default, and reboot the system.
You can assign System name, Location, Contact and view system information.
Figure 4.2.1.1 – Web UI of the Switch Setting
System Name: You can assign a name to the device. The available characters you can
input is 64. After you configure the name, CLI system will select the first 12 characters as
24
the name in CLI system.
System Location: You can specify the switch’s physical location here. The available
characters you can input are 64.
System Contact: You can specify contact people here. You can type the name, mail
address or other information of the administrator. The available characters you can input
are 64.
System OID: The SNMP object ID of the switch. You can follow the path to find its private
MIB in MIB browser. (Note: When you attempt to view private MIB, you should compile
private MIB files into your MIB browser first.)
System Description: JetNet 5428G Industrial Managed Switch is the name of this
product.
Firmware Version: Display the firmware version installed in this device.
MAC Address: Display unique hardware address (MAC address) assigned by the
manufacturer.
Once you finish the configuration, click on Apply to apply your settings.
Note: Always remember to select Save to save your settings. Otherwise, the settings you
made will be lost when the switch is powered off.
User name: You can key in new user name here. The default setting is admin.
Password: You can key in new password here. The default setting is admin.
Confirm Password: You need to type the new password again to confirm it.
Once you finish configuring the settings, click on Apply to apply your configuration.
25
4.2.3 IP Configuration
This function allows users to configure the switch’s IP address settings.
DHCP Client: You can select to Enable or Disable DHCP Client function. When DHCP
Client function is enabled, an IP address will be assigned to the switch from the network’s
DHCP server. In this mode, the default IP address will therefore be replaced by the one
assigned by DHCP server. If DHCP Client is disabled, then the IP address that you
specified will be used instead.
IP Address: You can assign the IP address reserved by your network for your JetNet. If
DHCP Client function is enabled, you don’t need to assign an IP address to the JetNet, as
it will be overwritten by DHCP server and shown here. The default IP is 192.168.10.1.
Subnet Mask: You can assign the subnet mask for the IP address here. If DHCP Client
function is enabled, you don’t need to assign the subnet mask. The default Subnet Mask is
255.255.255.0. Note: In the CLI, we use the enabled bit of the subnet mask to represent
the number displayed in web UI. For example, 8 stands for 255.0.0.0; 16 stands for
255.255.0.0; 24 stands for 255.255.255.0.
Default Gateway: You can assign the gateway for the switch here. The default gateway is
192.168.10.254. Note: In CLI, we use 0.0.0.0/0 to represent for the default gateway.
Once you finish configuring the settings, click on Apply to apply your configuration.
IPv6 Configuration –An IPv6 address is represented as eight groups of four hexadecimal
digits, each group representing 16 bits (two octets). The groups are separated by colons (:),
and the length of IPv6 address is 128bits.
An example of an IPv6 address is: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
The default IP address of JetNet Managed Switch is fe80:0:0:0:212:77ff:fe60:ca90, and
26
the Leading zeroes in a group may be omitted. Thus, the example address may be written
as: fe80::212:77ff:fe60:ca90.
27
The system will update IPv6 Neighbor Table automatically, and user also can click the icon
“Reload” to refresh the tabale.
28
Manual Setting: User can select “Manual setting” to change time as user wants. User
also can click the button “Get Time from PC” to get PC’s time setting for switch. After click
the “Get Time from PC” and apply the setting, the System time display the same time as
your PC’s time.
NTP client: Select the Time Setting Source to NTP client can let device enable the NTP
client service. NTP client will be automatically enabled if you change Time source to NTP
Client. The system will send request packet to acquire current time from the NTP server
you assigned.
IEEE 1588: select the PTP State to enable this function and select one
operating mode for the precision time synchronizes.
Auto mode: the switch performs PTP Master and slave mode (Bindary mode)
29
Time-zone: Select the time zone where the switch is located. Following table lists the time
zones for different locations for your reference. The default time zone is GMT Greenwich
Mean Time.
30
42 (GMT+03:30) Tehran
43 (GMT+04:00) Abu Dhabi, Muscat
44 (GMT+04:00) Baku, Tbilisi, Yerevan
45 (GMT+04:30) Kabul
46 (GMT+05:00) Ekaterinburg
47 (GMT+05:00) Islamabad, Karachi, Tashkent
48 (GMT+05:30) Calcutta, Chennai, Mumbai, New Delhi
49 (GMT+05:45) Kathmandu
50 (GMT+06:00) Almaty, Novosibirsk
51 (GMT+06:00) Astana, Dhaka
52 (GMT+06:00) Sri Jayawardenepura
53 (GMT+06:30) Rangoon
54 (GMT+07:00) Bangkok, Hanoi, Jakarta
55 (GMT+07:00) Krasnoyarsk
56 (GMT+08:00) Beijing, Chongqing, Hong Kong, Urumqi
57 (GMT+08:00) Irkutsk, Ulaan Bataar
58 (GMT+08:00) Kuala Lumpur, Singapore
59 (GMT+08:00) Perth
60 (GMT+08:00) Taipei
61 (GMT+09:00) Osaka, Sapporo, Tokyo
62 (GMT+09:00) Seoul
63 (GMT+09:00) Yakutsk
64 (GMT+09:30) Adelaide
65 (GMT+09:30) Darwin
66 (GMT+10:00) Brisbane
67 (GMT+10:00) Canberra, Melbourne, Sydney
68 (GMT+10:00) Guam, Port Moresby
69 (GMT+10:00) Hobart
70 (GMT+10:00) Vladivostok
71 (GMT+11:00) Magadan, Solomon Is., New Caledonia
72 (GMT+12:00) Aukland, Wellington
73 (GMT+12:00) Fiji, Kamchatka, Marshall Is.
74 (GMT+13:00) Nuku’alofa
Daylight Saving Time: Set when Enable Daylight Saving Time start and end, during the
Daylight Saving Time, the device’s time is one hour earlier than the actual time.
Once you finish your configuration, click on Apply to apply your configuration.
31
Once you finish your configuration, click on Apply to apply your configuration.
Once you have finished the configuration, click Apply to apply your configuration
Excluded Address:
You can type a specific address into the IP Address field for the DHCP server reserved IP
address.
The IP address that is listed in the Excluded Address List Table will not be assigned to
the network device. Add or remove an IP address from the Excluded Address List by
clicking Add or Remove.
32
Manual Binding: JetNet 5428G provides a MAC address and IP address binding and
removing function. You can type in the specified IP and MAC address, then click Add to
add a new MAC&IP address binding rule for a specified link partner, like PLC or any device
without DHCP client function. To remove from the binding list, just select the rule to
remove and click Remove.
DHCP Leased Entries: JetNet 5428G provides an assigned IP address list for user check.
It will show the MAC and IP address that was assigned by JetNet 5428G. Click the Reload
button to refresh the listing.
33
DHCP Relay Agent: The DHCP Relay Agent is also known as DHCP Option 82. It can
help relay the DHCP Request to remote DHCP server located in different subnet.
Note: The DHCP Server can not work with DHCP Relay Agent at the same time.
Relay Agent: Choose Enable or Disable the relay agent.
Relay Policy: The Relay Policy is used when the DHCP request is relayed through
more than one switch. The switch can drop, keep or replace the MAC address of the
DHCP Request packet.
Helper Address: Type the IP address of the target DHCP Server. There are 4
available IP addresses.
Startup Configuration File: After you saved the running-config to flash, the new settings
34
will be kept and work after power cycle. You can use show startup-config to view it in CLI.
The Backup command can only backup such configuration file to your PC or TFTP server.
Technical Tip:
Default Configuration File: The switch provides the default configuration file in the
system. You can use Reset button, Reload command to reset the system.
Running Configuration File: The switch’s CLI allows you to view the latest settings
running by the system. The information shown here is the settings you set up but
haven’t saved to flash. The settings not yet saved to flash will not work after power
recycle. You can use show running-config to view it in CLI.
Once you finish selecting and configuring the settings, click on Backup or Restore to run
Click on Folder icon to select the target file you want to backup/restore.
Note that the folders of the path to the target file do not allow you to input space key.
35
Type the IP address of TFTP Server IP. Then click on Backup/Restore.
Note: point to the wrong file will cause the entire configuration missed
There are 2 modes for users to backup/restore the configuration file, Local File mode and
TFTP Server mode.
Local File mode: In this mode, the switch acts as the file server. Users can browse the
target folder and then type the file name to backup the configuration. Users also can
browse the target folder and select the existed configuration file to restore the
configuration back to the switch. This mode is only provided by Web UI while CLI is not
supported.
TFTP Server mode: In this mode, the switch acts as the TFTP client. Before you do so,
make sure that your TFTP server is ready. And then please type the IP address of TFTP
Server IP address. This mode can be used in both CLI and Web UI.
TFTP Server IP Address: You need to key in the IP address of your TFTP Server here.
36
Firmware File Name: The file name of the new firmware.
The UI also shows you the current firmware version and built date of current firmware.
Please check the version number after the switch is rebooted.
Click on Folder icon to select the target firmware file you want to upgrade.
Figure 4.2.6.3 Error Message due to the file error or not a firmware for the switch.
Before upgrading firmware, please check the file name and switch model name first and
carefully. Korenix switch provide protection when upgrading incorrect firmware file, the
system would not crash even download the incorrect firmware. Even we have the
protection, we still ask you don’t try/test upgrade incorrect firmware, the unexpected event
may occure or damage the system.
37
Figure 4.2.6.5 Firmware Upgrade – TFTP Server mode.
Type the IP address of TFTP Server and Firmware File Name. Then click on Upgrade to
start the process.
After finishing transmitting the firmware, the system will copy the firmware file and replace
the firmware in the flash. The CLI show …… until the process is finished.
Figure 4.2.7.2 Popup alert screen to confirm the command. Click on Yes to start it.
38
Figure 4.2.7.2 Popup message screen to show you that have done the command. Click on
OK to close the screen. Then please go to Reboot page to reboot the switch.
Click on OK. The system will then auto reboot the device.
Note: If you already configured the IP of your device to other IP address, when you use this
command by CLI and Web UI, our software will not reset the IP address to default IP. The
system will remain the IP address so that you can still connect the switch via the network.
Figure 4.2.8.2 Pop-up alert screen to request confirmation. Click on Yes. Then the switch
will be rebooted immediately.
Figure 4.2.8.3 Pop-up message screen appears when rebooting the switch..
39
Note: Since different browser may has different behavior. If the Web GUI don’t re-login well,
please manually type the IP Address and login the system again.
Admin Password
User Name and SWITCH(config)# administrator
NAME Administrator account name
Password SWITCH(config)# administrator orwell
PASSWORD Administrator account password
SWITCH(config)# administrator orwell orwell
40
Change administrator account orwell and password orwell
success.
Display SWITCH# show administrator
Administrator account information
name: orwell
password: orwell
IP Configuration
IP Address/Mask SWITCH(config)# int vlan 1
(192.168.10.8, SWITCH(config-if)# ip
255.255.255.0 address
dhcp
SWITCH(config-if)# ip address 192.168.10.8/24
(DHCP Client)
SWITCH(config-if)# ip dhcp client
SWITCH(config-if)# ip dhcp client renew
Gateway SWITCH(config)# ip route 0.0.0.0/0 192.168.10.254/24
Remove Gateway SWITCH(config)# no ip route 0.0.0.0/0 192.168.10.254/24
Display SWITCH# show interface vlan1
interface vlan1 is up, line protocol detection is disabled
index 22 metric 1 mtu 1500 <…>
Hwaddr: 00:12:77:ff:13:57
inet 192.168.10.8/24 broadcast 192.168.10.255
………..
41
primary
secondary
SWITCH(config)# ntp peer primary
IPADDR
SWITCH(config)# ntp peer primary 192.168.10.120
Time Zone SWITCH(config)# clock timezone 26
Sun Jan 1 04:13:24 2006 (GMT) Greenwich Mean Time:
Dublin, Edinburgh, Lisbon, London
Jumbo Frame
Jumbo Frame Type the maximum MTU to enable Jumbo Frame:
SWITCH(config)# system mtu
<64-9216> bytes (with VLAN tag)
Switch(config)# system mtu 9216
DHCP
DHCP Commands Switch(config)# router dhcp
Switch(config-dhcp)#
default-router DHCP Default Router
end Exit current mode and down to previous enable mode
42
exit Exit current mode and down to previous mode
ip IP protocol
lease DHCP Lease Time
list Print command list
network dhcp network
no remove
quit Exit current mode and down to previous mode
service enable service
DHCP Server Enable Switch(config-dhcp)# service dhcp
<cr>
DHCP Server IP Pool Switch(config-dhcp)# network
A.B.C.D/M network/mask ex. 10.10.1.0/24
(Network/Mask) Switch(config-dhcp)# network 192.168.10.0/24
DHCP Server – Switch(config-dhcp)# default-router
A.B.C.D address
Default Gateway Switch(config-dhcp)# default-router 192.168.10.254
DHCP Server – lease Switch(config-dhcp)# lease
TIME second
time Switch(config-dhcp)# lease 1000 (1000 second)
DHCP Server – Switch(config-dhcp)# ip dhcp excluded-address
A.B.C.D IP address
Excluded Address Switch(config-dhcp)# ip dhcp excluded-address
192.168.10.123
<cr>
DHCP Server – Static Switch(config-dhcp)# ip dhcp static
MACADDR MAC address
IP and MAC binding Switch(config-dhcp)# ip dhcp static 0012.7700.0001
A.B.C.D leased IP address
Switch(config-dhcp)# ip dhcp static 0012.7700.0001
192.168.10.99
DHCP Relay – Switch(config-dhcp)# ip dhcp relay information
option Option82
Enable DHCP Relay policy Option82
Switch(config-dhcp)# ip dhcp relay information option
DHCP Relay – DHCP Switch(config-dhcp)# ip dhcp relay information policy
drop Relay Policy
policy keep Drop/Keep/Replace option82 field
replace
Switch(config-dhcp)# ip dhcp relay information policy drop
<cr>
Switch(config-dhcp)# ip dhcp relay information policy keep
<cr>
Switch(config-dhcp)# ip dhcp relay information policy replace
<cr>
DHCP Relay – IP Switch(config-dhcp)# ip dhcp helper-address
A.B.C.D
Helper Address Switch(config-dhcp)# ip dhcp helper-address 192.168.10.200
Reset DHCP Settings Switch(config-dhcp)# ip dhcp reset
<cr>
DHCP Server Switch# show ip dhcp server statistics
43
Excluded Address List
IP Address
192.168.10.123
44
4.3 Port Configuration
Port Configuration group enables you to enable/disable port state, or configure port
auto-negotiation, speed, and duplex, flow control, rate limit control and port aggregation
settings. It also allows you to view port status and aggregation information.
There are 24 Fast Ethernet ports. In Web UI, choose the port number you want to
configure, the available number from port 1~28. Port 1~24 presents Fast Ethernet ports. In
CLI, use fa1, fa2…fa24 to present port 1 to port 24
As to the Gigabit Compo ports, it always uses port 25, 26, 27 and 28. In CLI use gi25, gi26,
gi27 and gi28 to present the port 25-28.
45
Select the port you want to configure and make changes to the port.
In State column, you can enable or disable the state of this port. Once you disable, the
port stop to link to the other end and stop to forward any traffic. The default setting is
Enable which means all the ports are workable when you receive the device.
In Speed/Duplex column, you can configure port speed and duplex mode of this port.
Below are the selections you can choose:
Fast Ethernet Port 1~24 (fa1~fa24): AutoNegotiation, 10M Full Duplex(10 Full), 10M Half
Duplex(10 Half), 100M Full Duplex(100 Full) and 100M Half Duplex(100 Half).
Gigabit Ethernet Combo Port 25~28: (gi25~gi28): AutoNegotiation, 10M Full Duplex(10
Full), 10M Half Duplex(10 Half), 100M Full Duplex(100 Full), 100M Half Duplex(100 Half),
1000M Full Duplex(1000 Full), 1000M Half Duplex(1000 Half).
The default mode is Auto Negotiation mode.
Note: The on board Gigabit SFP port (SFP 25, 26, 27 and 28) in JetNet 5428G/
5428G-DC only support 1000M Full mode.
SFP Port in JetNet 5428G-2G-2SFP (gi27~gi28): 100M Full or 1000M Full
In Flow Control column, “Symmetric” means that you need to activate the flow control
function of the remote network device in order to let the flow control of that corresponding
port on the switch to work. “Disable” means that you don’t need to activate the flow control
function of the remote network device, as the flow control of that corresponding port on the
switch will work anyway.
In Description column, you can add description for the port. You can know the target it
attached to easier in remote.
Once you finish configuring the settings, click on Apply to save the configuration.
Technical Tips: If both ends are not at the same speed, they can’t link with each other. If
both ends are not in the same duplex mode, they will be connected by half mode.
46
Figure 4.3.3.1 shows you the port status.
Note: The UI can display vendor name, wave length and distance of all Korenix Gigabit
SFP transceiver family. If you see Unknown information, it may mean that the vendor
doesn’t provide their information or that the information of their transceiver can’t be read.
47
4.3.5 Storm Control
The Storm Control is similar to Rate Control. Rate Control filters all the traffic over the
threshold you input by UI. Storm Control allows user to define the Rate for specific Packet
Types.
Figure 4.3.5.1
Packet type: You can assign the Rate for specific packet types based on packet number
per second. The packet types of the Ingress Rule listed here include Broadcast, DLF
(Destination Lookup Failure) and Multicast. Choose Enable/Disable to enable or
disable the storm control of specific port.
48
Rate: This column allows you to manually assign the limit rate of the port. The unit is
packets per second. The limit range is from 1 to 262143 packet/sec, zero means no limit.
The maximum available value of Fast Ethernet interface is 148810, this is the maximum
packet number of the 100M throughput.
Enter the Rate field of the port you want assign, type the new value and click Enter key first.
After assigned or changed the value for all the ports you want configure. Click on Apply to
apply the configuration of all ports. The Apply command applied all the ports’ storm control
value, it may take some time and the web interface become slow, this is normal condition.
There are some different descriptions for the port trunking. Different manufacturers may
use different descriptions for their products, like Link Aggregation Group (LAG), Link
Aggregation Control Protocol, Ethernet Trunk, Ether Channel…etc. Most of the
implementations now conform to IEEE standard, 802.3ad.
The aggregated ports can interconnect to the other switch which also supports Port
Trunking. Korenix Supports 2 types of port trunking. One is Static Trunk, the other is
802.3ad. When the other end uses 802.3ad LACP, you should assign 802.3ad LACP to
the trunk. When the other end uses non-802.3ad, you can then use Static Trunk. In
practical, the Static Trunk is suggested.
Aggregation Setting
49
Trunk Size: The switch can support up to 8 trunk groups. Each trunk group can support up
to 8 member ports. Since the member ports should use same speed/duplex, the maximum
trunk size is decided by the port volume.
Group ID: Group ID is the ID for the port trunking group. Ports with same group ID are in
the same group. Click None, you can select the Trunk ID from Trunk 1 to Trunk 8.
Trunk Type: Static and 802.3ad LACP. Each Trunk Group can only support Static or
802.3ad LACP. Choose the type you need here. The not active port can’t be setup here.
Port Priority: The command allows you to change the port priority setting of the specific
port. LACP port priority is configured on each port using LACP. The port priority can be
configured through the CLI. The higher the number, the lower the priority. The default value
is 32768.
LACP Timeout: The LACPDU is generated and continue transmit within the LACP group.
The interval time of the LACPDU Long timeout is 30 sec, this is default setting. The
LACPDP Short timeout is 1 sec, the command to change from Long to Short is only
applied to the CLI, the web GUI doesn’t support this. Once the LACP port doesn’t receive
the LACPDP 3 times, that means the port may leave the group without earlier inform or
does not detect by the switch, then the port will be removed from the group.
This command can be used when connect the switch by 2-port LACP through not-direct
connected or shared media, like the Wireless AP or Hub. The end of the switch may not
directly detect the failure, the LACP Short Timeout can detect the LACP group failure
earlier within 3 seconds.
Aggregation Status
This page shows the status of port aggregation. Once the aggregation ports are negotiated
well, you will see following status.
50
column.
Individual: When LACP is enabled, member ports of LACP group which are not
connected to correct LACP member ports will be displayed in the Individual column.
Link Down: When LACP is enabled, member ports of LACP group which are not linked up
will be displayed in the Link Down column.
Port Status
Port Status Switch# show interface fa1
Interface fastethernet1
Administrative Status : Enable
Operating Status : Connected
Duplex : Full
Speed : 100
MTU: 1518
Flow Control :off
Default Port VLAN ID: 1
Ingress Filtering : Disabled
Acceptable Frame Type : All
Port Security : Disabled
Auto Negotiation : Disable
Loopback Mode : None
STP Status: forwarding
Default CoS Value for untagged packets is 0.
Mdix mode is Disable.
Medium mode is Copper.
51
Note: Administrative Status -> Port state of the port. Operating
status -> Current status of the port. Duplex -> Duplex mode of
the port. Speed -> Speed mode of the port. Flow control ->
Flow Control status of the port.
Rate Control
Rate Control – Switch(config-if)# rate-limit
egress Outgoing packets
Ingress or Egress ingress Incoming packets
52
Port 2:
DLF Enable
Broadcast Enable
Multicast Enable
………….
Port Trunking
LACP Switch(config)# lacp group 1 gi8-10
Group 1 based on LACP(802.3ad) is enabled!
53
Port Priority Key Key State
----- ----------- -------- -------- -------
8 1 8 8 0x45
9 1 9 9 0x45
10 1 10 10 0x45
Trunk Group
GroupID Protocol Ports
--------+---------+------------------------------------
1 LACP 8(D) 9(D) 10(D)
54
4.4 Network Redundancy
It is critical for industrial applications that network remains non-stop. Korenix develops
multiple kinds of standard (STP, RSTP and MSTP) and Korenix patterned redundancy
protocol, Multiple Super Ring to remain the network redundancy can be protected well by
Korenix switch.
The JetNet 5428G Series supports advanced Multiple Spanning Tree Protocol (MSTP).
This protocol is a direct extension of RSTP. It can provide an independent spanning tree
for different VLANs. It simplifies network management, provides for even faster
convergence than RSTP by limiting the size of each region, and prevents VLAN members
from being segmented from the rest of the group (as sometimes occurs with IEEE 802.1D
STP).
rd
Multiple Super Ring (MSR) technology is Korenix’s 3 generation Ring redundancy
technology. This is patented and protected by Korenix and is used in countries all over the
world. MSR ranks the fastest restore and failover time in the world, 0 ms for restore and
about 5 milliseconds for failover for copper.
The single Korenix switch can aggregate multiple Rings within one switch. All the ports can
be configured as the ring port of a ring, each ring has its own Ring ID and the Ring ID will
be added to the watchdog packet to monitor the ring status. This is Korenix Patterned
MultiRing Technology.
The Ring ports can be LACP/Port Trunking ports, after aggregated ports to a group, the
group of ports can act as the Ring port of the Ring. This is Korenix Pattened TrunkRing
Technology.
Advanced Rapid Dual Homing(RDH) technology also facilitates JetNet switch to connect
with a core managed switch easily and conveniently. With RDH technology, you can also
couple several Rapid Super Rings or RSTP cloud together.
The STP Configuraiton, STP Port Configuration and STP Information pages are available
while select the STP and RSTP mode.
The MSTP Configuraiton, MSTP Port Configuration and MSTP Information pages are
available while select the MSTP mode.
The Multiple Super Ring and Multiple Super Ring Information are available while select the
MSR mode.
55
4.4.1 STP Configuration
This page allows select the STP mode and configuring the global STP/RSTP Bridge
Configuration.
The STP mode includes the STP, RSTP, MSTP and Disable. Please select the STP mode
for your system first. The default mode is RSTP enabled.
After select the STP or RSTP mode, continue to configure the global Bridge parameters for
STP and RSTP.
Figure 4.4.1.1 show the web page which allows you to select the STP mode, configure the
global STP/RSTP/MSTP settings.
Bridge Configuration
Priority (0-61440): RSTP uses bridge ID to determine the root bridge, the bridge with the
highest bridge ID becomes the root bridge. The bridge ID is composed of bridge priority
and bridge MAC address. So that the bridge with the highest priority becomes the highest
56
bridge ID. If all the bridge ID has the same priority, the bridge with the lowest MAC address
will then become the root bridge.
Note: The bridge priority value must be in multiples of 4096. A device with a lower number
has a higher bridge priority. Ex: 4096 is higher than 32768.
Note: The Web GUI allows user select the priority number directly. This is the convinent of
the GUI design. When you configure the value through the CLI or SNMP, you may need to
type the value directly. Please follow the n x 4096 ruls for the Bridge Priority.
Max Age (6-40): Enter a value from 6 to 40 seconds here. This value represents the time
that a bridge will wait without receiving Spanning Tree Protocol configuration messages
before attempting to reconfigure.
If JetNet is not the root bridge, and if it has not received a hello message from the root
bridge in an amount of time equal to Max Age, then JetNet will reconfigure itself as a root
bridge. Once two or more devices on the network are recognized as a root bridge, the
devices will renegotiate to set up a new spanning tree topology.
The MAX Age value affects the maximum volume of the RSTP loop. In the RSTP BPDU
packet, there is one field, message age which start from 0, add 1 after passed one hop in
the RSTP loop. When the message age is larger than MAX Age, the BPDU would be
ignored and the lower switches are separated to different RSTP domain. The switches in
other RSTP domain can’t be managed through upper switch.
Since different RSTP aware switches may have their own mechanism to calculate the
message age. So that this is most possibly occurred when interoperate different vendors’
RSTP aware switches together. The maximum volume of the Korenix RSTP domain is 23,
configure the MAX Age lower than 23 is recommended.
Hello Time (1-10): Enter a value from 1 to 10 seconds here. This is a periodic timer that
drives the switch to send out BPDU (Bridge Protocol Data Unit) packet to check current
STP status.
The root bridge of the spanning tree topology periodically sends out a “hello” message to
other devices on the network to check if the topology is “healthy”. The “hello time” is the
amount of time the root has waited during sending hello messages.
Forward Delay Time (4-30): Enter a value between 4 and 30 seconds. This value is the
time that a port waits before changing from Spanning Tree Protocol learning and listening
states to forwarding state.
This is the amount of time JetNet will wait before checking to see if it should be changed to
a different state.
Once you have completed your configuration, click on Apply to apply your settings.
Note: You must observe the following rule to configure Hello Time, Forwarding Delay, and
Max Age parameter
R.. 2 × (Forward Delay Time – 1 sec) ≥ Max Age Time ≥ 2 × (Hello Time value +
1 sec)
Port Configuration
Select the port you want to configure and you will be able to view current settings and
status of the port.
Path Cost: Enter a number between 1 and 200,000,000. This value represents the “cost”
of the path to the other bridge from the transmitting bridge at the specified port.
57
Priority: Enter a value between 0 and 240, using multiples of 16. This is the value that
decides which port should be blocked by priority in a LAN.
Link Type: There are 3 types for you select. Auto, P2P and Share.
Some of the rapid state transitions that are possible within RSTP depend upon whether the
port of concern can only be connected to another bridge (i.e. it is served by a point-to-point
LAN segment), or if it can be connected to two or more bridges (i.e. it is served by a
shared-medium LAN segment). This function allows link status of the link to be
manipulated administratively. “Auto” means to auto select P2P or Share mode. “P2P”
means P2P is enabled, the 2 ends work in Full duplex mode. While “Share” is enabled, it
means P2P is disabled, the 2 ends may connect through a share media and work in Half
duplex mode.
Edge Port: A port directly connected to the end stations cannot create a bridging loop in
the network. To configure this port as an edge port, set the port to the Enable state. When
the non-bridge device connects an admin edge port, this port will be in blocking state and
turn to forwarding state in 4 seconds.
Once you finish your configuration, click on Apply to save your settings.
58
4.4.3 RSTP Info
This page allows you to see the information of the root switch and port status.
Root Information: You can see root Bridge ID, Root Priority, Root Port, Root Path Cost
and the Max Age, Hello Time and Forward Delay of BPDU sent from the root switch.
Port Information: You can see port Role, Port State, Path Cost, Port Priority, Oper P2P
mode, Oper edge port mode and Aggregated(ID/Type).
MSTP is the abbreviation of Multiple Spanning Tree Protocol. This protocol is a direct
extension of RSTP. It can provide an independent spanning tree for different VLANs. It
simplifies network management, provides for even faster convergence than RSTP by
limiting the size of each region, and prevents VLAN members from being segmented from
the rest of the group (as sometimes occurs with IEEE 802.1D STP).
While using MSTP, there are some new concepts of network architecture. A switch may
belong to different groups, act as root or designate switch, generate BPDU for the network
to maintain the forwarding table of the spanning tree. With MSTP can also provide multiple
forwarding paths and enable load balancing. Understand the architecture allows you to
maintain the correct spanning tree and operate effectively.
One VLAN can be mapped to a Multiple Spanning Tree Instance (MSTI). For example, the
maximum Instance JetNet supports is usually 16, range from 0-15. The MSTP builds a
separate Multiple Spanning Tree (MST) for each instance to maintain connectivity among
each of the assigned VLAN groups. An Internal Spanning Tree (IST) is used to connect all
the MSTP switches within an MST region. An MST Region may contain multiple MSTP
Instances.
59
The figure shows there are 2 VLANs/MSTP Instances and each instance has its Root and
forwarding paths.
A Common Spanning Tree (CST) interconnects all adjuacent MST regions and acts as a
virtual bridge node for communications with STP or RSTP nodes in the global network.
MSTP connects all bridges and LAN segments with a single Common and Internal
Spanning Tree (CIST). The CIST is formed as a result of the running spanning tree
algorithm between switches that support the STP, RSTP, MSTP protocols.
The figure shows the CST large network. In this network, a Region may has different
instances and its own forwarding path and table, however, it acts as a single Brige of CST.
To configure the MSTP setting, the STP Mode of the STP Configuration page should be
changed to MSTP mode first.
60
After enabled MSTP mode, then you can go to the MSTP Configuraiton pages.
This page allows configure the Region Name and its Revision, mapping the VLAN to
Instance and check current MST Instance configuration. The network can be divided
virtually to different Regions. The switches within the Region should have the same
Region and Revision leve.
Region Name: The name for the Region. Maximum length: 32 characters.
Revision: The revision for the Region. Range: 0-65535; Default: 0)
Once you finish your configuration, click on Apply to apply your settings.
This page allows mapping the VLAN to Instance and assign priority to the instance. Before
mapping VLAN to Instance, you should create VLAN and assign the member ports first.
Please refer to the VLAN setting page.
61
Instance ID: Select the Instance ID, the available number is 1-15.
VLAN Group: Type the VLAN ID you want mapping to the instance.
Instance Priority: Assign the priority to the instance.
After finish your configuration, click on Add to apply your settings.
This page allows you to see the current MST Instance Configuration you added. Click on
“Apply” to apply the setting. You can “Remove” the instance or “Reload“ the configuration
display in this page.
62
Path Cost: Enter a number between 1 and 200,000,000. This value represents the “cost”
of the path to the other bridge from the transmitting bridge at the specified port.
Priority: Enter a value between 0 and 240, using multiples of 16. This is the value that
decides which port should be blocked by priority in a LAN.
Link Type: There are 3 types for you select. Auto, P2P and Share.
Some of the rapid state transitions that are possible within RSTP depend upon whether the
port of concern can only be connected to another bridge (i.e. it is served by a point-to-point
LAN segment), or if it can be connected to two or more bridges (i.e. it is served by a
shared-medium LAN segment). This function allows link status of the link to be
manipulated administratively. “Auto” means to auto select P2P or Share mode. “P2P”
means P2P is enabled, the 2 ends work in Full duplex mode. While “Share” is enabled, it
means P2P is disabled, the 2 ends may connect through a share media and work in Half
duplex mode.
Edge: A port directly connected to the end stations cannot create a bridging loop in the
network. To configure this port as an edge port, set the port to the Enable state. When the
non-bridge device connects an admin edge port, this port will be in blocking state and turn
to forwarding state in 4 seconds.
Once you finish your configuration, click on Apply to save your settings.
63
first one. In such connection, you can implement Korenix Multiple Super Ring technology
to get fastest recovery performance.
rd
Multiple Super Ring (MSR) technology is Korenix’s 3 generation Ring redundancy
technology. This is patented and protected by Korenix and is used in countries all over the
world. MSR ranks the fastest restore and failover time in the world, 0 ms for restore and
about milliseconds level for failover for 100Base-TX copper port. The other interface may
take longer time due to the media characteristics.
Advanced Rapid Dual Homing (RDH) technology also facilitates JetNet Managed Switch
to connect with a core managed switch easily and conveniently. With RDH technology, you
can also couple several Rapid Super Rings or RSTP cloud together, which is also known
as Auto Ring Coupling.
TrunkRing technology allows integrate MSR with LACP/Port Trunking. The LACP/Trunk
aggregated ports is a virtual interface and it can work as the Ring port of the MSR.
To become backwards compatible with the Legacy Super Ring technology implemented in
JetNet 4008/4508 V1 series switches, JetNet 4510/4518/5000 Series also supports Super
Ring Client mode. The Super Ring ports can pass through Super Ring control packets
extremely well and works with Super Ring.
New Ring: To create a Rapid Super Ring. Just fill in the Ring ID which has range from 0 to
31. If the name field is left blank, the name of this ring will automatically naming with Ring
ID.
64
Ring Configuration
ID: Once a Ring is created, This appears and can not be changed.
Name: This field will show the name of the Ring. If it is not filled in when creating, it will be
automatically named by the rule “RingID”.
Version: The version of Ring can be changed here. There are three modes to choose:
st
Rapid Super Ring as default; Super ring for compatible with Korenix 1 general ring and
Any Ring for compatible with other version of rings.
Device Priority: The switch with highest priority (highest value) will be automatically
selected as Ring Master. Then one of the ring ports in this switch will become forwarding
port and the other one will become blocking port. If all of the switches have the same
priority, the switch with the biggest MAC address will be selected as Ring Master.
Ring Port1: In Rapid Super Ring environment, you should have 2 Ring Ports. No matter
this switch is Ring Master or not, when configuring RSR, 2 ports should be selected to be
Ring Ports. For Ring Master, one of the ring ports will become the forwarding port and the
other one will become the blocking port.
Path Cost: Change the Path Cost of Ring Port1. If this switch is the Ring Master of a Ring,
then it determines the blocking port. The Port with higher Path Cost in the two ring Port will
become the blocking port, If the Path Cost is the same, the port with larger port number will
become the blocking port.
In Dual Homing I released with JetNet 4000/4500 series, you have to configure
additional port as Dual Homing port to two uplink switches. In Rapid Dual Homing, you
don’t need to configure specific port to connect to other protocol. The Rapid Dual Homing
will smartly choose the fastest link for primary link and block all the other link to avoid loop.
If the primary link failed, Rapid Dual Homing will automatically forward the secondary link
for network redundant. Of course, if there are more connections, they will be standby links
and recover one of then if both primary and secondary links are broken.
Ring status: To enable/disable the Ring. Please remember to enable the ring after you
add it.
MultiRing: The MultiRing technology is one of the pattern of the MSR technology, the
technology allows you to aggregate multiple rings within one switch. Create multiple ring
ID and assign different ring port 1 and port 2 to each ring, thus the switch can have multiple
rings in one JetNet switch.
When implementing MultiRing, remember that the different rings can NOT use the same
ring ID. The other settings are the same as above description. Technically, the maximum
ring volume the MultiRing supported is up to 16 rings. Due to the port volume limitation, the
mximum value is half of the port volume of a switch.
TrunkRing: The MultiRing technology is part of the MSR technology which combines the
MSR with the port trunking technology. After multiple ports aggregated, this is so-call port
trunking (Static or learnt by LACP protocol), the Trunk ID can be one of the port ID of the
MSR technology. Configured the port trunking first then you can add the Trunk group as a
Ring Port in managed switch.
65
4.4.8 Ring Info
This page shows the MSR information.
Version: which version of this ring, this field could be Rapid Super Ring, Super Ring, or
Any Ring
Status: If this field is Normal which means the redundancy is approved. If any one of the
link in this Ring is broken, then the status will be Abnormal.
RM MAC: The MAC address of Ring Master of this Ring. It helps to find the redundant
path.
Role Transition Count: This means how many times this switch has changed its Role
from nonRM to RM or from RM to nonRM.
Ring state Transition Count: This number means how many times the Ring status has
been transformed between Normal and Abnormal state.
66
Bridge Priority Switch(config)# spanning-tree priority
<0-61440> valid range is 0 to 61440 in multiple of 4096
Switch(config)# spanning-tree priority 4096
Bridge Times Switch(config)# spanning-tree bridge-times (forward Delay)
(max-age) (Hello Time)
Switch(config)# spanning-tree bridge-times 15 20 2
This command allows you configure all the timing in one time.
Forward Delay Switch(config)# spanning-tree forward-time
<4-30> Valid range is 4~30 seconds
Switch(config)# spanning-tree forward-time 15
Max Age Switch(config)# spanning-tree max-age
<6-40> Valid range is 6~40 seconds
Switch(config)# spanning-tree max-age 20
Hello Time Switch(config)# spanning-tree hello-time
<1-10> Valid range is 1~10 seconds
Switch(config)# spanning-tree hello-time 2
MSTP
Enter the MSTP Switch(config)# spanning-tree mst
Configuration Tree MSTMAP the mst instance number or range
configuration enter mst configuration mode
forward-time the forwa67oreneay time
hello-time the hello time
max-age the message maximum age time
max-hops the maximum hops
sync sync port state of exist vlan entry
Switch(config)# spanning-tree mst configuration
Switch(config)# spanning-tree mst configuration
Switch(config-mst)#
abort exit current mode and discard all changes
end exit current mode, change to enable mode and apply all
changes
exit exit current mode and apply all changes
instance the mst instance
list Print command list
name the name of mst region
no Negate a command or set its defaults
quit exit current mode and apply all changes
revision the revision of mst region
show show mst configuration
Region Configuration Region Name:
Switch(config-mst)# name
NAME the name string
Switch(config-mst)# na67orenixnix
Region Revision:
Switch(config-mst)# revision
<0-65535> the value of revision
Switch(config-mst)# revision 65535
Mapping Instance to Switch(config-mst)# instance
VLAN (Ex: Mapping <1-15> target instance number
VLAN 2 to Instance 1) Switch(config-mst)# instance 1 vlan
VLANMAP target vlan number(ex.10) or range(ex.1-10)
Switch(config-mst)# instance 1 vlan 2
Display Current MST Switch(config-mst)# show current
Configuraion Current MST configuration
Name 67orenixnix]
Revision 65535
67
Instance Vlans Mapped
-------- --------------------------------------
0 1,4-4094
1 2
2 --
Config HMAC-MD5 Digest:
0Xb41829F9030A054FB74EF7A8587FF58D
------------------------------------------------
Remove Region Switch(config-mst)# no
Name name name configure
revision revision configure
instance the mst instance
Switch(config-mst)# no name
Remove Instance Switch(config-mst)# no instance
example <1-15> target instance number
Switch(config-mst)# no instance 2
Show Pending MST Switch(config-mst)# show pending
Configuration Pending MST configuration
Name [] (->The name is removed by no name)
Revision 65535
Instance Vlans Mapped
-------- --------------------------------------
0 1,3-4094
1 2 (->Instance 2 is removed by no instance –
Config HMAC-MD5 Digest:
0x3AB68794D602FDF43B21C0B37AC3BCA8
------------------------------------------------
Apply the setting and Switch(config-mst)# quit
go to the apply all mst configuration changes
configuration mode Switch(config)#
Apply the setting and Switch(config-mst)# end
go to the global mode apply all mst configuration changes
Switch#
Abort the Setting and Switch(config-mst)# abort
go to the discard all mst configuration changes
configuration mode. Switch(config)# spanning-tree mst configuration
Switch(config-mst)# show pending
Show Pending to see Pending MST configuration
the new settings are Name 68orenixnix] (->The nameis not applied after Abort
not applied. settings.)
Revision 65535
Instance Vlans Mapped
-------- --------------------------------------
0 1,4-4094
1 2
2 3 (-> The instance is not applied after Abort settings–
Config HMAC-MD5 Digest:
0Xb41829F9030A054FB74EF7A8587FF58D
------------------------------------------------
RSTP
The mode should be rst, the timings can be configured in global
settings listed in above.
Global Information
Active Information Switch# show spanning-tree active
Spanning-Tree : Enabled Protocol : MSTP
Root Address : 0012.77ee.eeee Priority : 32768
Root Path Cost : 0 Root Port : N/A
68
Root Times : max-age 20, hello-time 2, forward-delay 15
Bridge Address : 0012.77ee.eeee Priority : 32768
Bridge Times : max-age 20, hello-time 2, forward-delay 15
BPDU transmission-limit : 3
69
Port Role State Cost Prio.Nbr Type
------ ---------- ---------- -------- ---------- ------------------
fa1 Designated Forwarding 200000 128.1 P2P Internal(MSTP)
fa2 Designated Forwarding 200000 128.2 P2P Internal(MSTP)
70
Stop Multiple Super Ring success.
Change Ring name Switch(config-multiple-super-ring)# name MSR1
Note: Default Ring name is “Ring1”, 1 is the Ring ID.
Super Ring Version Switch(config-multiple-super-ring)# version
default set default to rapid super ring
rapid-super-ring rapid super ring
super-ring super ring
71
Ring ID is optional. If the ring ID is typed, this command will only
display the information of the target Ring.
72
4.5 VLAN
A Virtual LAN (VLAN) is a “logical” grouping of nodes for the purpose of limiting a
broadcast domain to specific members of a group without physically grouping the
members together. That means, VLAN allows you to isolate network traffic so that only
members of VLAN could receive traffic from the same VLAN members. Basically, creating
a VLAN from a switch is the logical equivalent of physically reconnecting a group of
network devices to another Layer 2 switch, without actually disconnecting these devices
from their original switches.
JetNet 5428G Series Industrial Ethernet Switch supports 802.1Q VLAN. 802.1Q VLAN is
also known as Tag-Based VLAN. This Tag-Based VLAN allows VLAN to be created
across different switches (see Figure 1). IEEE 802.1Q tag-based VLAN makes use of
VLAN control information stored in a VLAN header attached to IEEE 802.3 packet frames.
This tag contains a VLAN Identifier (VID) that indicates which VLAN a frame belongs to.
Since each switch only has to check a frame’s tag, without the need to dissect the contents
of the frame, this also saves a lot of computing resources within the switch.
Figure 4.5.1 802.1Q VLAN
QinQ
The QinQ is originally
designed to expand the
number of VLANs by
adding a tag to the
802.1Q packets. The
original VLAN is usually
identified as Customer
VLAN (C-VLAN) and the
new added t–g – as
Service VLAN(S-VLAN).
By adding the additional
tag, QinQ increases the
possible number of
VLANs. After QinQ
enabled, the JetNet can
reach up to 256x256 VLANs. With different standard tags, it also improves the network
security.
73
VLAN Configuration group enables you to Add/Remove VLAN, configure QinQ, port
Ingress/Egress parameters and view VLAN table.
PVID: The abbreviation of the Port VLAN ID. Enter port VLAN ID here. PVID allows the
switches to identify which port belongs to which VLAN. To keep things simple, it is
recommended that PVID is equivalent to VLAN IDs.
The values of PVIDs are from 0 to 4095. But, 0 and 4095 are reserved. You can’t input
these 2 PVIDs. 1 is the default value. 2 to 4094 are valid and available in this column. Type
the PVID you’d like to configure here.
74
Tunnel Mode: This is the new command for QinQ. The command includes None, 802.1Q
Tunnel and 802.1Q Tunnel Uplink. The figure shows the relationship between 802.1Q
Tunnel and 802.1Q Tunnel Uplink.
802.1Q Tunnel: The QinQ command applied to the ports which connect to the C-VLAN.
The port receives tagged frame from the C-VLAN. Add a new tag (Port VID) as S-VLAN
VID. When the packets are forwarded to C-VLAN, the S-VLAN tag is removed.
After 802.1Q Tunnel mode is assigned to a port, the egress setting of the port should be
“Untag”, it indicates the egress packet is always untagged. This is configured in Static
VLAN Configuration table. Please refer to the VLAN Configuration chapter in below.
802.1Q Tunnel Uplink: The QinQ command applied to the ports which connect to the
S-VLAN. The port receives tagged frame from the S-VLAN. When the packets are
forwarded to S-VLAN, the S-VLAN tag is kept.
After 802.1Q Tunnel Uplink mode is assigned to a port, the egress setting of the port
should be “Tag”, it indicates the egress packet is always tagged. This is configured in
Static VLAN Configuration table. Please refer to the VLAN Configuration chapter in
below.
For example, the VID of S-VLAN/Tunnel Uplink is 10, the VID of C-VLAN/Tunnel is 5. The
802.1Q Tunnel port receives tag 5 from C-VLAN, add tag 10 to the packet. When the
packets are forwarded to S-VLAN, tag 10 is kept.
EtherType: This column allows you to define the EtherType manually. This is advanced
QinQ parameter which allows to define the transmission packet type.
Accept Frame Type: This column defines the accepted frame type of the port. There are 2
modes you can select, Admit All and Tag Only. Admit All mode means that the port can
accept both tagged and untagged packets. Tag Only mode means that the port can only
accept tagged packets.
Ingress Filtering: Ingress filtering helps VLAN engine to filter out undesired traffic on a
port. When Ingress Filtering is enabled, the port checks whether the incoming frames
belong to the VLAN they claimed or not. Then the port determines if the frames can be
processed or not. For example, if a tagged frame from Engineer VLAN is received, and
Ingress Filtering is enabled, the switch will determine if the port is on the Engineer VLAN’s
Egress list. If it is, the frame can be processed. If it’s not, the frame would be dropped.
75
Management VLAN ID: The switch supports management VLAN. The management
VLAN ID is the VLAN ID of the CPU interface so that only member ports of the
management VLAN can ping and access the switch. The default management VLAN
ID is 1.
Static VLAN: You can assign a VLAN ID and VLAN Name for new VLAN here.
VLAN ID is used by the switch to identify different VLANs. Valid VLAN ID is between 1 and
4094. 1 is the default VLAN.
VLAN Name is a reference for network administrator to identify different VLANs. The
available character is 12 for you to input. If you don’t input VLAN name, the system will
automatically assign VLAN name for the VLAN. The rule is VLAN (VLAN ID).
76
Note: Before you change the management VLAN ID by Web and Telnet, remember that
the port attached by the administrator should be the member port of the management
VLAN; otherwise the administrator can’t access the switch via the network.
Note: Currently JetNet 5428G supports max 256 group VLAN.
-- : Not available
U: Untag: Indicates that egress/outgoing frames are not VLAN tagged.
T : Tag: Indicates that egress/outgoing frames are to be VLAN tagged.
Steps to configure Egress rules: Select the VLAN ID. Entry of the selected VLAN turns to
light blue. Assign Egress rule of the ports to U or T. Press Apply to apply the setting. If you
77
want to remove one VLAN, select the VLAN entry. Then press Remove button.
Status: Static shows this is a manually configured static VLAN. Unused means this VLAN
is created by UI/CLI and has no member ports. This VLAN is not workable yet. Dynamic
means this VLAN is learnt by GVRP.
78
After created the VLAN, the status of this VLAN will remain in Unused status until you add
ports to the VLAN.
79
ingress filtering disable
Egress rule – Untagged Switch(config-if)# switchport access vlan 2
(for VLAN 2) switchport access vl–n – success
Egress rule – Tagged Switch(config-if)# switchport trunk allowed vlan add 2
(for VLAN 2)
Display – Port Ingress Switch# show interface fa1
Rule (PVID, Ingress Interface fastethernet1
Filtering, Acceptable Administrative Status : Enable
Frame Type) Operating Status : Not Connected
Duplex : Auto
Speed : Auto
Flow Control :off
Default Port VLAN ID: 2
Ingress Filtering : Disabled
Acceptable Frame Type : All
Port Security : Disabled
Auto Negotiation : Enable
Loopback Mode : None
STP Status: disabled
Default CoS Value for untagged packets is 0.
Mdix mode is Auto.
Medium mode is Copper.
Current configuration:
hostname Switch
vlan learning independent
………
………
interface fastethernet5
switchport access vlan add 1-2,10
80
switchport dot1q-tunnel mode access
!
interface fastethernet6
switchport access vlan add 1-2
switchport trunk allowed vlan add 10
switchport dot1q-tunnel mode uplink
!
VLAN Configuration
Create VLAN (2) Switch(config)# vlan 2
vlan 2 success
Note: You can only remove the VLAN when the VLAN is in
unused mode.
VLAN Name Switch(config)# vlan 2
vlan 2 has exists
Switch(config-vlan)# name v2
Switch(config-vlan)# no name
81
index 14 metric 1 mtu 1500 <UP,BROADCAST,RUNNING,MULTICAST>
HWaddr: 00:12:77:ff:01:b0
inet 192.168.10.100/24 broadcast 192.168.10.255
input packets 639, bytes 38248, dropped 0, multicast packets 0
input errors 0, length 0, overrun 0, CRC 0, frame 0, fifo 0, missed 0
output packets 959, bytes 829280, dropped 0
output errors 0, aborted 0, carrier 0, fifo 0, heartbeat 0, window 0
collisions 0
GVRP configuration
GVRP enable/disable Switch(config)# gvrp mode
disable Disable GVRP feature globally on the switch
enable Enable GVRP feature globally on the switch
Switch(config)# gvrp mode enable
Gvrp is enabled on the switch!
Configure GVRP timer Switch(config)# inter fa1
Switch(config-if)# garp timer
Join timer /Leave timer/ <10-10000>
LeaveAll timer Switch(config-if)# garp timer 20 60 1000
Note: The unit of these timer is centisecond
Management VLAN
Management VLAN Switch(config)# int vlan 1 (Go to management VLAN)
Switch(config-if)# no shutdown
Display Switch# show running-config
….
!
interface vlan1
ip address 192.168.10.17/24
ip igmp
no shutdown
!
….
82
4.6 Private VLAN
The private VLAN helps to resolve the primary VLAN ID shortage, client ports’ isolation
and network security issues. The Private VLAN provides primary and secondary VLAN
within a single switch.
Primary VLAN: The uplink port is usually the primary VLAN. A primary VLAN contains
promiscuous ports that can communicate with lower Secondary VLANs.
Secondary VLAN: The client ports are usually defined within secondary VLAN. The
secondary VLAN includes Isolated VLAN and Community VLAN. The client ports can be
isolated VLANs or can be grouped in the same Community VLAN. The ports within the
same community VLAN can communicate with each other. However, the isolated VLAN
ports can Not.
The figure shows the typical Private VLAN network. The SCADA/Public Server or NMS
workstation is usually located in primary VLAN. The clients PCs or Rings are located within
Secondary.
Private VLAN (PVLAN) Configuration group enables you to Configure PVLAN, PVLAN
Port and see the PVLAN Information.
Following commands are included in this group:
83
communicate with each other.
Port Configuraion
PVLAN Port T pe :
Normal: The Normal port is None PVLAN ports, it remains its original VLAN setting.
Host: The Host type ports can be mapped to the Secondary VLAN.
Promiscuous: The promiscuous port can be associated to the Primary VLAN.
VLAN ID: After assigned the port type, the web UI display the available VLAN ID the port
can associate to.
84
For example:
1. VLAN Create: VLAN 2-5 are created in VLAN Configuration page.
2. Private VLAN Type: VLAN 2-5 has its Private VLAN Type configured in Private VLAN
Configuration page.
VLAN 2 is belonged to Primary VLAN.
VLAN 3-5 are belonged to secondary VLAN (Isolated or Community).
3. Private VLAN Association: Associate VLAN 3-5 to VLAN 2 in Private VLAN
Association first.
4. Private VLAN Port Configuraiton
VLAN 2 – Primary -> The member port of VLAN 2 is promiscuous port.
VLAN 3 – Isolated -> The Host port can be mapped to VLAN 3.
VLAN 4 – Community -> The Host port can be mapped to VLAN 3.
R.. VLAN 5 – Community -> The Host port can be mapped to VLAN 5. Result:
VLAN 2 -> VLAN 3, 4, 5; member ports can communicate with ports in secondary VLAN.
VLAN 3 -> VLAN 2, member ports are isolated, but it can communicate with member port
of VLAN 2..
VLAN 4 -> VLAN 2, member ports within the community can communicate with each other
and communicate with member port of VLAN 2.
VLAN 5 -> VLAN 2, member ports within the community can communicate with each other
and communicate with member port of VLAN 2.
85
4.6.3 Private VLAN Information
This page allows you to see the Private VLAN information.
86
<cr>
87
---- ----------------- -----------------
2 primary gi10
3 isolated gi9
4 community gi8
5 community fa7,gi9
10 primary -
Host List Switch# show vlan private-vlan port-list
Ports Mode Vlan
----- ----------- ----
1 normal -
2 normal -
3 normal -
4 normal -
5 normal -
6 normal -
7 host 5
8 host 4
9 host 3
10 promiscuous 2
Running Config Switch# show run
Information Building configuration...
Current configuration:
hostname Switch
vlan learning independent
!
vlan 1
!
Private VLAN Type vlan 2
private-vlan primary
!
vlan 3
private-vlan isolated
!
vlan 4
private-vlan community
!
vlan 5
private-vlan community
!
………..
………..
Private VLAN Port interface fastethernet7
Information switchport access vlan add 2,5
switchport trunk native vlan 5
switchport mode private-vlan host
switchport private-vlan host-association 2 5
!
interface gigabitethernet8
switchport access vlan add 2,4
switchport trunk native vlan 4
switchport mode private-vlan host
switchport private-vlan host-association 2 4
!
interface gigabitethernet9
switchport access vlan add 2,5
switchport trunk native vlan 5
88
switchport mode private-vlan host
switchport private-vlan host-association 2 3
!
interface gigabitethernet10
switchport access vlan add 2,5
switchport trunk native vlan 2
switchport mode private-vlan promiscuous
switchport private-vlan mapping 2 add 3-5
………
……..
89
4.7 Traffic Prioritization
Quality of Service (QoS) provides traffic prioritization mechanism which allows users to
deliver better service to certain flows. QoS can also help to alleviate congestion problems
and ensure high-priority traffic is delivered first. This section allows you to configure Traffic
Prioritization settings for each port with regard to setting priorities.
JetNet QOS supports 4 physical queues, weighted fair queuing (WRR) and Strict Priority
scheme, which follows 802.1p COS tag and IPv4 TOS/DiffServ information to prioritize the
traffic of your industrial network.
In QoS setting, you should choose the QoS Priority Mode first, Port-Based, Cos or DSCP
modes. Choose the preferred mode and you can configure the next settings in its own
configuration pages. The other page of the mode you don’t select can’t be configured.
90
Queue Scheduling
You can select the Queue Scheduling rule as follows:
Use a strict priority scheme. Packets with higher priority in the queue will always be
processed first, except that there is no packet with higher priority.
Use Weighted Round Robin scheme. This scheme allows users to assign new weight
ratio for each class. The 10 is the highest ratio. The ratio of each class is as below:
Wx / W0 + W1 + W2 + W3 (Total volume of Queue 0-3)
91
After configuration, press Apply to enable the settings.
92
Queue Scheduling – Switch(config)# qos queue-sched
Strict Priority sp Strict Priority
wrr Weighted Round Robin
Switch(config)# qos queue-sched sp
The queue scheduling scheme is setting to Strict Priority.
Queue Scheduli–g - Switch(config)# qos queue-sched wrr
WRR <1-10> Weights for COS queue 0 (queue_id 0)
Switch(config)# qos queue-sched wrr 10
<1-10> Weights for COS queue 1 (queue_id 1)
………..
Switch(config)# qos queue-sched wrr 1 2 3 4
The queue scheduling scheme is setting to Weighted Round
Robin.
Note: When change the port setting, you should Select the
specific port first. Ex: fa1 means fast Ethernet port 1.
QoS Priority Mode Switch(config)# qos priority
cos CoS
dscp DSCP/TOS
port-based Port-based
Switch(config)# qos priority dscp
93
Note: Format: qos cos-map priority_value queue_value
d2| 0 1 2 3 4 5 6 7 8 9
d1 |
-----+----------------------
0|1111111100
1|0000000000
2|0000111111
3|1122222222
4|2222222233
5|3333333333
6|3333
94
4.8 Multicast Filtering
For multicast filtering, JetNet 5428G uses IGMP Snooping technology. IGMP (Internet
Group Management Protocol) is an Internet Protocol that provides a way for internet
device to report its multicast group membership to adjacent routers. Multicasting allows
one computer on the internet to send data to a multitude of other computers that have
identified themselves as being interested in receiving the originating computers data.
Multicasting is useful for such applications as updating the address books of mobile
computer users in the field, sending out newsletters to a distribution list, and broadcasting
streaming media to an audience that has tuned into the event by setting up multicast group
membership.
In effect, IGMP Snooping manages multicast traffic by making use of switches, routers,
and hosts that support IGMP. Enabling IGMP Snooping allows the ports to detect IGMP
queries, report packets, and manage multicast traffic through the switch. IGMP has three
fundamental types of messages, as shown below:
Message Description
Query A message sent from the querier (an IGMP router or a switch) which
asks for a response from each host that belongs to the multicast group.
Report A message sent by a host to the querier to indicate that the host wants
to be or is a member of a given group indicated in the report message.
Leave Group A message sent by a host to the querier to indicate that the host has
quit as a member of a specific multicast group.
You can enable IGMP Snooping and IGMP Query functions here. You will see the
information of the IGMP Snooping function in this section, including different multicast
groups’ VID and member ports, and IP multicast addresses that range from 224.0.0.0 to
239.255.255.255.
In this section, Force filtering can determined whether the switch flooding unknown
multicast or not.
Following commands are included in this group:
4.7.1 IGMP Snooping
4.7.4 GMRP
95
Select All checkbox for all VLANs. Then press Enable. In the same way, you can also
Disable IGMP Snooping for certain VLANs.
IGMP Snooping Table: In the table, you can see multicast group IP address, VLAN ID it
belongs to, and member ports of the multicast group. JetNet 5428G supports 256 multicast
groups. Click on Reload to refresh the table.
96
This page allows users to configure IGMP Query feature. Since JetNet 5428G can only be
configured by member ports of the management VLAN, IGMP Query can only be enabled
on the management VLAN. If you want to run IGMP Snooping feature in several VLANs,
you should notice that whether each VLAN has its own IGMP Querier first.
The IGMP querier periodically sends query packets to all end-stations on the LANs or
VLANs that are connected to it. For networks with more than one IGMP querier, a switch
with the lowest IP address becomes the IGMP querier.
In IGMP Query selection, you can select V1, V2 or Disable. V1 means IGMP V1 General
Query and V2 means IGMP V2 General Query.. The query will be forwarded to all
multicast groups in the VLAN. Disable allows you to disable IGMP Query.
Query Interval(s): The period of query sent by querier.
Query Maximum Response Time: The span querier detect to confirm there are no more
directly connected group members on a LAN.
Once you finish configuring the settings, click on Apply to apply your configuration.
Once you finish configuring the settings, click on Apply to apply your configuration.
97
4.8.4 GMRP
To enable the GMRP configuration, the Global GMRP Configuration should be enabled
first. And all the port interfaces should enable GMRP learning as well. Then the switch
exchange the IGMP Table with other switches which is also GMRP-aware devices.
98
- VLAN IGMP snooping is disabled on VLAN 3.
Display – IGMP Switc99odbu ip igmp
Snooping Setting interface vlan1
enabled: Yes
version: IGMPv1
query-interval; 125s
query-max-response-time: 10s
Unknown Multicast
Send to Query Ports – Switch(config)# ip igmp snooping source-only-learning
IGMP Snooping Source-Only-Learning enabled
Discard (Force filtering) Switch(config)# mac-address-table multicast filtering
99
Filtering unknown multicast addresses ok!
Send to All Ports Switch(config)# no mac-address-table multicast filtering
(No Discard, No Send
to Query Ports) Switch(config)# no ip igmp snooping source-only-learning
IGMP Snooping Source-Only-Learning disabled
100
4.9 SNMP
Simple Network Management Protocol (SNMP) is a
protocol used for exchanging management
information between network devices. SNMP is a
member of the TCP/IP protocol suite. JetNet 5428G
series support SNMP v1 and v2c and V3.
An SNMP managed network consists of two main
components: agents and a manager. An agent is a
management software module that resides in a
managed switch. An agent translates the local
management information from the managed device
into a SNMP compatible format. The manager is the
console through the network.
Following commands are included in this group:
4.8.1 SNMP Configuration
Note: When you first install the device in your network, we highly recommend you to
change the community string. Since most SNMP management application uses Public and
Private as their default community name, this might be the leakage of the network security.
101
4.9.2 SNMP V3 Profile
SNMP v3 can provide more security functions when the user performs remote
management through SNMP protocol. It delivers SNMP information to the administrator
with user authentication; all of data between JetNet 5428G and the administrator are
encrypted to ensure secure communication.
Security Level: Here the user can select the following levels of security: None, User
Authentication, and Authentication with privacy.
Authentication Protocol: Here the user can select either MD5 (Message-Digest
algorithm 5) or SHA (Secure Hash Algorithm). MD5 is a widely used cryptographic hash
function with a 128-bit hash value. SHA (Secure Hash Algorithm) hash functions refer to
five Federal Information Processing Standard-approved algorithms for computing a
condensed digital representation. JetNet 5428G provides 2 user authentication protocols
in MD5 and SHA. You will need to configure SNMP v3 parameters for your SNMP tool with
the same authentication method.
102
Authentication Password: Here the user enters the SNMP v3 user authentication
password.
DES Encryption Password: Here the user enters the password for SNMP v3 user DES
Encryption.
103
4.9.4 CLI Commands of the SNMP
Command Lines of the SNMP configuration
SNMP Community
Read Only Community Switch(config)# snmp-server community public ro
community string add ok
Read Write Community Switch(config)# snmp-server community private rw
community string add ok
SNMP Trap
Enable Trap Switch(config)# snmp-server enable trap
Set SNMP trap enable ok.
SNMP Trap Server IP Switch(config)# snmp-server host 192.168.10.33
without specific SNMP trap host add OK.
community name
SNMP Trap Server IP Switch(config)# snmp-server host 192.168.10.33 version 1
with version 1 and private
community SNMP trap host add OK.
Note: private is the community name, version 1 is the
SNMP version
SNMP Trap Server IP Switch(config)# snmp-server host 192.168.10.33 version 2
with version 2 and private
community SNMP trap host add OK.
Disable SNMP Trap Switch(config)# no snmp-server enable trap
Set SNMP trap disable ok.
Display Switch# sh snmp-server trap
SNMP trap: Enabled
SNMP trap community: public
104
4.10 Security
JetNet 5428G provides several security features for you to secure your connection. The
Filter Set is also known as Access Control List. The ACL feature includes traditional Port
Security and IP Security.
Following commands are included in this group:
4.9.1 Filter Set (Access Control List)
4.9.2 IEEE 802.1x
4.9.3 CLI Commands of the Security
ACE is short of Access Control Entry, user defines the Permit or Deny rule for specific
IP/MAC address or IP groups by network mask in each ACE. One ACL may include
several ACEs, the system checks the ACEs one after one and forward based on the result.
Once the rules conflict, the old entry is selected as the forward rule.
Type the Name when select MAC Filter, type ID/Name when select IP Filter. The ID for IP
access list is listed as below of the field. Click Add to add the rule. Click Edit to edit the
content for the rule. After configured, click Apply to apply all the rules. Reload to reload
setting. Remove to remove one of the entries.
105
MAC Filter (Port Security):
The MAC Filter allows user to define the Access Control List for specific MAC address or a
group of MAC addresses.
106
Egress Port: Bind the MAC Filter rule to specific front port.
Once you finish configuring the ACE settings, click on Add to apply your configuration.
You can see below screen is shown.
Example of the below Entry:
Permit Source MAC “0012.7700.0000” to Destination MAC “0012.7700.0002”.
The Permit rule is egress rule and it is bind to Gigabit Ethernet Port 25.
Once you finish configuring the settings, click on Apply to apply your configuration.
IP Filter:
Type ID/Name when select IP Filter. The ID for IP access list is listed as below of the field.
You can also type ACL name in this field, it goes to IP Extended mode setting and support
both IP Standard and IP Extended mode depend on the setting. Click Add to add the rule.
Click Edit to edit the content for the rule. After configured, click Apply to apply all the rules.
Reload to reload setting. Remove to remove one of the entries.
107
Example:
IP Standard Access List: This kind of ACL allows user to define filter rules according to the
source IP address.
IP Extended Access List: This kind of ACL allows user to define filter rules according to
the source IP address, destination IP address, Source TCP/UDP port, destination
TCP/UDP port and ICMP type and code.
108
Filter ID/Name: The ID or the name for this IP Filter entry.
Action: Permit to permit traffic from specified sources. Deny to deny traffic from those
sources.
Source/Destination Address: Type the source/destination IP address you want
configure.
Source/Destination Wildcard: This command allows user to define single host or a group
of hosts based on the wildcard. Some of the allowance examples are as below:
Note: The mask is a wildcard mask: the high-order bits of the mask that are binary zeros
determine how many corresponding high-order bits in the IP address are significant. The
selected action applies to any source address with these high-order bits.
Protocol: Select a protocol you want associate with the filter. The field includes IP, TCP,
UDP or ICMP type.
Destination Port: TCP/UDP port of the Destination Port field.
ICMP Type: The ICMP Protocol Type range from 1 ~ 255.
ICMP Code: The ICMP Protocol Code range from 1 ~ 255.
Egress Port: Bind this Filter to selected egress port.
Click the Add button to add the rule to the Filter. Click the Remove button to remove the
selected rule from Filter. Click the Modify button to edit the rule which you selected. Click
the Reload button to reload the rule table.
Click the Apply button to apply the Filter configurations.
109
4.10.2 Filter Set (Access Control List)
After configured the ACL filter rules, remember associate this filter with the physical ports.
Then the port has the capability to filter traffic/attach based on the packets lost.
110
System AuthControl: To enable or disable the 802.1x authentication.
Authentication Method: Radius is a authentication server that provide key for
authentication, with this method, user must connect switch to server. If user select Local
for the authentication method, switch use the local user data base which can be create in
this page for authentication.
Radius Server IP: The IP address of Radius server
Shared Key: The password for communicate between switch and Radius Server.
Server Port: UDP port of Radius server.
Accounting Port: Port for packets that contain the information of account login or logout.
Secondary Radius Server IP: Secondary Radius Server could be set in case of the
primary radius server down.
Local Radius User: Here User can add Account/Password for local authentication.
Local Radius User List: This is a list shows the account information, User also can
remove selected account Here.
4.10.3.2 802.1x Port Configuration
After the configuration of Radius Server or Local user list, user also need configure
the authentication mode, authentication behavior, applied VLAN for each port and
permitted communication. The following information will explain the port configuration.
111
Once you finish configuring the settings, click on Apply to apply your configuration.
Port control: Force Authorized means this port is authorized; the data is free to in/out.
Force unauthorized just opposite, the port is blocked. If users want to control this port with
Radius Server, please select Auto for port control.
Reauthentication: If enable this field, switch will ask client to re-authenticate. The default
time interval is 3600 seconds.
Max Request: the maximum times that the switch allow client request.
Guest VLAN: 0 to 4094 is available for this field. If this field is set to 0, that means the port
is blocked after authentication fail. Otherwise, the port will be set to Guest VLAN.
Host Mode: if there are more than one device connected to this port, set the Host Mode to
single means only the first PC authenticate success can access this port. If this port is set
to multi, all the device can access this port once any one of them pass the authentication.
Control Direction: determined devices can end data out only or both send and receive.
Re-Auth Period: control the Re-authentication time interval, 1~65535 is available.
Quiet Period: When authentication failed, Switch will wait for a period and try to
communicate with radius server again.
Tx period: the time interval of authentication request.
Supplicant Timeout: the timeout for the client authenticating
Sever Timeout: The timeout for server response for authenticating.
Click Initialize Selected to set the authorize state of selected port to initialize status.
Click Reauthenticate Selected to send EAP Request to supplicant to request
reauthentication.
112
Click Default Selected to reset the configurable 802.1x parameters of selected port to the
default values. 802.1X Port Status
Here user can observe the port status for Port control status, Authorize Status,
Authorized Supplicant and Oper Control Direction each port.
Port Security
Add MAC access list Switch(config)# mac access-list extended
NAME access-list name
Switch(config)# mac access-list extended server1
Switch(config-ext-macl)#
permit Specify packets to forward
deny Specify packets to reject
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
list Print command list
no Negate a command or set its defaults
quit Exit current mode and down to previous mode
Add IP Standard access Switch(config)# ip access-list
list extended Extended access-list
standard Standard access-list
Switch(config)# ip access-list standard
<1-99> Standard IP access-list number
<1300-1999> Standard IP access-list number (expanded
range)
WORD Access-list name
Switch(config)# ip access-list standard 1
Switch(config-std-acl)#
deny Specify packets to reject
permit Specify packets to forward
113
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
list Print command list
no Negate a command or set its defaults
quit Exit current mode and down to previous mode
remark Access list entry comment
Add IP Extended Switch(config)# ip access-list extended
access list <100-199> Extended IP access-list number
<2000-2699> Extended IP access-list number (expanded
range)
WORD access-list name
Switch(config)# ip access-list extended 100
Switch(config-ext-acl)#
deny Specify packets to reject
permit Specify packets to forward
end End current mode and down to previous mode
exit Exit current mode and down to previous mode
list Print command list
no Negate a command or set its defaults
quit Exit current mode and down to previous mode
remark Access list entry comment
Example 1: Edit MAC Switch(config-ext-macl)#permit
access list MACADDR Source MAC address xxxx.xxxx.xxxx
any any source MAC address
host A single source host
Switch(config-ext-macl)#permit host
MACADDR Source MAC address xxxx.xxxx.xxxx
Switch(config-ext-macl)#permit host 0012.7711.2233
MACADDR Destination MAC address xxxx.xxxx.xxxx
any any destination MAC address
host A single destination host
Switch(config-ext-macl)#permit host 0012.7711.2233 host
MACADDR Destination MAC address xxxx.xxxx.xxxx
Switch(config-ext-macl)#permit host 0012.7711.2233 host
0011.7711.2234
[IFNAME] Egress interface name
Switch(config-ext-macl)#permit host 0012.7711.2233 host
0011.7711.2234 gi25
114
Switch(config-ext-acl)#permit ip 192.168.10.1 0.0.0.1
192.168.10.100 0.0.0.1
[IFNAME] Egress interface name
Switch(config-ext-acl)#permit ip 192.168.10.1 0.0.0.1
192.168.10.100 0.0.0.1 gi26
Note: Rule: Add the static MAC, VLAN and Port binding first,
then enable the port security to stop new MAC learning.
Disable Port Security Switch(config-if)# no switchport port-security
Enable new MAC addresses learning and aging activities!
Display Switch# show mac-address-table static
Destination Address Address Type Vlan
Destination Port
------------------- --------------- ------- ------------------------
0012.7701.0101 Static 1 fa1
802.1x (shot of dot1x)
enable Switch(config)# dot1x system-auth-control
Switch(config)#
diable Switch(config)# no dot1x system-auth-control
Switch(config)#
authentic-method Switch(config)# dot1x authentic-method
local Use the local username database for authentication
radius Use the Remote Authentication Dial-In User
Service (RADIUS) servers for authentication
Switch(config)# dot1x authentic-method radius
Switch(config)#
radius server-ip Switch(config)# dot1x radius
Switch(config)# dot1x radius server-ip 192.168.10.120 key
1234
115
1234
116
RADIUS Server Port : 1812
RADIUS Accounting Port : 1813
Secondary RADIUS Server IP : N/A
Secondary RADIUS Server Key : N/A
Secondary RADIUS Server Port : N/A
Secondary RADIUS Accounting Port : N/A
117
4.11 Warning
JetNet 5428G provides several types of Warning features for you to remote monitor the
status of end devices or the change of your network. The features include System Log and
SMTP E-mail Alert.
Following commands are included in this group:
4.10.1 Event Selection
4.10.2 Syslog Configuration
4.10.3 SMTP Configuration
4.10.4 CLI Commands
118
Once you finish configuring the settings, click on Apply to apply your configuration.
Once you finish configuring the settings, click on Apply to apply your configuration.
119
Note: When enabling Local or Both mode, you can monitor the system logs in [Monitor
and Diag] / [Event Log] page.
Field Description
SMTP Server IP Address Enter the IP address of the email Server
Authentication Click on check box to enable password
User Name Enter email Account name (Max.40 characters)
Password Enter the password of the email account
Confirm Password Re-type the password of the email account
You can set up to 4 email addresses to receive email alarm from JetNet
Rcpt E-mail Address 1 The first email address to receive email alert from
JetNet (Max. 40 characters)
Rcpt E-mail Address 2 The second email address to receive email alert from
JetNet (Max. 40 characters)
120
Rcpt E-mail Address 3 The third email address to receive email alert from
JetNet (Max. 40 characters)
Rcpt E-mail Address 4 The fourth email address to receive email alert from
JetNet (Max. 40 characters)
Once you finish configuring the settings, click on Apply to apply your configuration.
121
admin@korenix.com ok.
Receiver mail Switch(config)# smtp-server receipt 1 korecare@korenix.com
SMTP Email Alert set receipt 122odbus122eare@korenix.com ok.
Authentication with Switch(config)# smtp-server authentication username admin
username and password admin
password SMTP Email Alert set authentication Username: admin, Password:
admin
122
4.12 Monitor and Diag
JetNet 5428G provides several types of features for you to monitor the status of the switch
or diagnostic for you to check the problem when encountering problems related to the
switch. The features include MAC Address Table, Port Statistics, Port Mirror, Event Log
and Ping.
Following commands are included in this group:
4.12.1 MAC Address Table
4.12.2 Port Statistics
4.12.3 Port Mirror
4.12.4 Event Log
4.12.5 Topology Discovery (LLDP)
4.12.6 Ping
4.12.7 Modbus/TCP
4.11.8 CLI Commands of the Monitor and Diag
123
4.12.2 Port Statistics
In this page, you can view operation statistics for each port. The statistics that can be
viewed include Link Type, Link State, Rx Good, Rx Bad, Rx Abort, Tx Good, Tx Bad and
Collision. Rx means the received packet while Tx means the transmitted packets.
Note: If you see many Bad, Abort or Collision counts increased, that may mean your
network cable is not connected well, the network performance of the port is poor…etc.
Please check your network cable, Network Interface Card of the connected device, the
network application, or reallocate the network traffic…etc.
Click on Clear Selected to reinitialize the counts of the selected ports, and Clear All to
reinitialize the counts of all ports. Click on Reload to refresh the counts.
124
4.12.3 Port Mirroring
Port mirroring (also called port spanning) is a tool that allows you to mirror the traffic from
one or more ports onto another port, without disrupting the flow of traffic on the original port.
Any traffic that goes into or out of the Source Port(s) will be duplicated at the Destination
Port. This traffic can then be analyzed at the Destination port using a monitoring device or
application. A network administrator will typically utilize this tool for diagnostics, debugging,
or fending off attacks.
Port Mirror Mode: Select Enable/Disable to enable/disable Port Mirror.
Source Port: This is also known as Monitor Port. These are the ports you want to monitor.
The traffic of all source/monitor ports will be copied to destination/analysis ports. You can
choose single port or any combination of ports, you can monitor them in Rx only, TX only
or both RX and TX. Click on checkbox of the RX, Tx to select the source ports.
Destination Port: This is also known as Analysis Port. You can analyze the traffic of all
the monitored ports at this port without affecting the flow of traffic on the port(s) being
monitored. Only one of the destination ports can be selected. A network administrator
would typically connect a LAN analyzer or Netxray device to this port.
Once you finish configuring the settings, click on Apply to apply the settings.
125
4.12.4 Event Log
In the 4.10.3, we have introduced System Log feature. When System Log Local mode is
selected, JetNet 5428G will record occurred events in local log table. This page shows this
log table. The entry includes the index, occurred data and time and content of the events.
Click on Clear to clear the entries. Click on Reload to refresh the table.
126
4.12.6 Ping Utility
This page provides Ping Utility for users to ping remote device and check whether the
device is alive or not. Type Target IP address of the target device and click on Start to
start the ping. After few seconds, you can see the result in the Result field.
127
4.12.7 Modbus/TCP
The Modbus is the most popular industrial protocol being
used today. Modbus is a “master-slave” architecture, where
the “master” sends polling request with address and data it
wants to one of multiple “slaves”. The slave device that is
addressed responds to master. The master is often a PC,
PLC, DCS or RTU… The salves are often the field devices.
Some of them are “hybrid”.
There are three most common Modbus versions, Modbus
ASCII, Modbus RTU and Modbus/TCP. Ethernet based
device, Industrial Ethernet Switch for example, supports
Modbus/TCP that it can be polled through Ethernet. Thus the
Modbus/TCP master can read or write the Modbus registers
provided by the Industrial Ethernet Switch.
Korenix JetNet 5428G implements the Modbus/TCP registers
into the latest firmware. The registers include the System
information, firmware information, IP address, interfaces’
status, port information, SFP information, inbound/outbound
packet information.
With the supported registers, users can read the information
through their own Modbus/TCP based progress/ display/
monitor applications and monitor the status of the switch
easily.
There is no Web UI for Modbus/TCP configuration. The Modbus/TCP configuration can be
changed through CLI.
128
Word 0 Lo byte = ‘e’
Word 1 Hi byte = ‘T’
Word 1 Lo byte = ‘N’
Word 2 Hi byte = ‘e’
Word 2 Lo byte = ‘t’
Word 3 Hi byte = ‘5’
Word 3 Lo byte = ‘4’
Word 4 Lo byte = ‘2’
Word 4 Hi byte = ‘8’
Word 5 Lo byte = ‘G’
Word 5 Hi byte = ‘\0’
(other words = 0)
0x0020 128 words SNMP system name (string)
0x00A0 128 words SNMP system location (string)
0x0120 128 words SNMP system contact (string)
0x01A0 32 words SNMP system OID (string)
0x01C0 2 words System uptime (unsigned long)
0x01C2 to 60 words Reserved address space
0x01FF
0x0200 2 words hardware version
0x0202 2 words S/N information
0x0204 2 words CPLD version
0x0206 2 words Boot loader version
0x0208 2 words Firmware Version
Word 0 Hi byte = major
Word 0 Lo byte = minor
Word 1 Hi byte = reserved
Word 1 Lo byte = reserved
0x020A 2 words Firmware Release Date
Firmware was released on 2010-08-11 at 09
o’clock
Word 0 = 0x0B09
Word 1 = 0x0A08
0x020C 3 words Ethernet MAC Address
Ex: MAC = 01-02-03-04-05-06
Word 0 Hi byte = 0x01
Word 0 Lo byte = 0x02
Word 1 Hi byte = 0x03
129
Word 1 Lo byte = 0x04
Word 2 Hi byte = 0x05
Word 2 Lo byte = 0x06
0x020F to 241 words Reserved address space
0x2FF
0x0300 2 words IP address
Ex: IP = 192.168.10.1
Word 0 Hi byte = 0xC0
Word 0 Lo byte = 0xA8
Word 1 Hi byte = 0x0A
Word 1 Lo byte = 0x01
0x0302 2 words Subnet Mask
0x0304 2 words Default Gateway
0x0306 2 words DNS Server
0x0308 to 248 words Reserved address space (IPv6 or others)
0x3FF
0x0400 1 word AC1
0x0000:Off
0x0001:ON
0XfFFF: unavailable
0x0401 1 word AC2
0x0000:Off
0x0001:ON
0XfFFF: unavailable
0x0402 1 word DC1
0x0000:Off
0x0001:ON
0XfFFF: unavailable
0x0403 1 word DC2
0x0000:Off
0x0001:ON
0XfFFF: unavailable
0x0404 to 12 words Reserved address space
0x040F
0x0410 1 word DI1
0x0000:Off
0x0001:ON
0XfFFF: unavailable
130
0x0411 1 word DI2
0x0000:Off
0x0001:ON
0XfFFF: unavailable
0x0412 1 word DO1
0x0000:Off
0x0001:ON
0XfFFF: unavailable
0x0413 1 word DO2
0x0000:Off
0x0001:ON
0XfFFF: unavailable
0x0414 to 12 words Reserved address space
0x041F
0x0420 1 word RDY
0x0000:Off
0x0001:On
0x0421 1 word RM
0x0000:Off
0x0001:On
0x0422 1 word RF
0x0000:Off
0x0001:On
0x0423 1 word RS
131
0x0003: auto (half)
0x0004: auto (full)
0x0005: autO
0XfFFF: unavailable
0x1260 to 1 word Speed
0x127F 0x0001: 10
0x0002: 100
0x0003: 1000
0x0004: 2500
0x0005: 10000
0x0101: auto 10
0x0102: auto 100
0x0103: auto 1000
0x0104: auto 2500
0x0105: auto 10000
0x0100: autO
0XfFFF: unavailable
0x1280 to 1 word Flow Control
0x129F 0x0000: off
0x0001: oN
0XfFFF: unavailable
0x12A0 to 1 word Default Port VLAN ID
0x12BF 0x0001-0XfFFF
0x12C0 to 1 word Ingress Filtering
0x12DF 0x0000: disable
0x0001: enable
0x12E0 to 1 word Acceptable Frame Type
0x12FF 0x0000: all
0x0001: tagged frame only
0x1300 to 1 word Port Security
0x131F 0x0000: disable
0x0001: enable
0x1320 to 1 word Auto Negotiation
0x133F 0x0000: disable
0x0001: enablE
0XfFFF: unavailable
0x1340 to 1 word Loopback Mode
0x135F 0x0000: none
132
0x0001: MAC
0x0002: PHy
0XfFFF: unavailable
0x1360 to 1 word STP Status
0x137F 0x0000: disabled
0x0001: blocking
0x0002: listening
0x0003: learning
0x0004: forwarding
0x1380 to 1 word Default CoS Value for untagged packets
0x139F
0x13A0 to 1 word MDIX
0x13BF 0x0000: disable
0x0001: enable
0x0002: autO
0XfFFF: unavailable
0x13C0 to 1 word Medium mode
0x13DF 0x0000: copper
0x0001: fiber
0x0002: nonE
0XfFFF: unavailable
0x13E0 to 288 words Reserved address space
0x14FF
SFP Information (32 Ports)
0x1500 to 1 word SFP Type
0x151F
0x1520 to 1 words Wave length
0x153F
0x1540 to 2 words Distance
0x157F
0x1580 to 8 words Vender
0x167F
0x1680 to 384 words Reserved address space
0x17FF
SFP DDM Information (32 Ports)
0x1800 to 1 words Temperature
0x181F
0x1820 to 2 words Alarm Temperature
133
0x185F
0x1860 to 1 words Tx power
0x187F
0x1880 to 2 words Warning Tx power
0x18BF
0x18C0 to 1 words Rx power
0x18DF
0x18E0 to 2 words Warning Rx power
0x191F
0x1920 to 1760 words Reserved address space
0x1FFF
Inbound packet information
0x2000 to 2 words Good Octets
0x203F
0x2040 to 2 words Bad Octets
0x207F
0x2080 to 2 words Unicast
0x20BF
0x20C0 to 2 words Broadcast
0x20FF
0x2100 to 2 words Multicast
0x213F
0x2140 to 2 words Pause
0x217F
0x2180 to 2 words Undersize
0x21BF
0x21C0 to 2 words Fragments
0x21FF
0x2200 to 2 words Oversize
0x223F
0x2240 to 2 words Jabbers
0x227F
0x2280 to 2 words Discards
0x22BF
0x22C0 to 2 words Filtered frames
0x22FF
0x2300 to 2 words RxError
0x233F
134
0x2340 to 2 words FCSError
0x237F
0x2380 to 2 words Collisions
0x23BF
0x23C0 to 2 words Dropped Frames
0x23FF
0x2400 to 2 words Last Activated SysUpTime
0x243F
0x2440 to 191 words Reserved address space
0x24FF
Outbound packet information
0x2500 to 2 words Good Octets
0x253F
0x2540 to 2 words Unicast
0x257F
0x2580 to 2 words Broadcast
0x25BF
0x25C0 to 2 words Multicast
0x25FF
0x2600 to 2 words Pause
0x263F
0x2640 to 2 words Deferred
0x267F
0x2680 to 2 words Collisions
0x26BF
0x26C0 to 2 words SingleCollision
0x26FF
0x2700 to 2 words MultipleCollision
0x273F
0x2740 to 2 words ExcessiveCollision
0x277F
0x2780 to 2 words LateCollision
0x27BF
0x27C0 to 2 words Filtered
0x27FF
0x2800 to 2 words FCSError
0x283F
0x2840 to 447 words Reserved address space
135
0x29FF
Number of frames received and transmitted with a length(in octets)
0x2A00 to 2 words 64
0x2A3F
0x2A40 to 2 words 65 to 127
0x2A7F
0x2A80 to 2 words 128 to 255
0x2ABF
0x2AC0 to 2 words 256 to 511
0x2AFF
0x2B00 to 2 words 512 to 1023
0x2B3F
0x2B40 to 2 words 1024 to maximum size
0x2B7F
136
***** MULTICAST MAC ADDRESS *****
Vlan Mac Address COS Status Ports
---- --------------- ---- ------- --------------------------
1 0100.5e40.0800 0 fa6
1 0100.5e7f.fffa 0 fa4,fa6
Show MAC Address Switch# show mac-address-table dynamic
Table – Dynamic Learnt Destination Address Address Type Vlan Destination Port
MAC addresses ------------------- --------------- ------- ------------------------
000f.b079.ca3b Dynamic 1 fa4
0012.7701.0386 Dynamic 1 fa7
Show MAC Address Switch# show mac-address-table multicast
Table – Multicast MAC Vlan Mac Address COS Status Ports
addresses ---- --------------- ---- ------- --------------------------
1 0100.5e40.0800 0 fa6-7
1 0100.5e7f.fffa 0 fa4,fa6-7
Show MAC Address Switch# show mac-address-table static
Table – Static MAC Destination Address Address Type Vlan Destination Port
addresses ------------------- --------------- ------- ------------------------
0012.7710.0101 Static 1 fa7
0012.7710.0102 Static 1 fa7
Show Aging timeout Switch# show mac-address-table aging-time
time the mac-address-table aging-time is 300 sec.
Port Statistics
Port Statistics Switch# show rmon statistics fa4 (select interface)
Interface fastethernet4 is enable connected, which has
Inbound:
Good Octets: 178792, Bad Octets: 0
Unicast: 598, Broadcast: 1764, Multicast: 160
Pause: 0, Undersize: 0, Fragments: 0
Oversize: 0, Jabbers: 0, Disacrds: 0
Filtered: 0, RxError: 0, FCSError: 0
Outbound:
Good Octets: 330500
Unicast: 602, Broadcast: 1, Multicast: 2261
Pause: 0, Deferred: 0, Collisions: 0
SingleCollision: 0, MultipleCollision: 0
ExcessiveCollision: 0, LateCollision: 0
Filtered: 0, FCSError: 0
Number of frames received and transmitted with a length of:
64: 2388, 65to127: 142, 128to255: 11
256to511: 64, 512to1023: 10, 1024toMaxSize: 42
Port Mirroring
Enable Port Mirror Switch(config)# mirror en
Mirror set enable ok.
Disable Port Mirror Switch(config)# mirror disable
Mirror set disable ok.
Select Source Port Switch(config)# mirror source fa1-2
both Received and transmitted traffic
rx Received traffic
tx Transmitted traffic
Switch(config)# mirror source fa1-2 both
Mirror source fa1-2 both set ok.
137
Display Switch# show mirror
Mirror Status : Enabled
Ingress Monitor Destination P rt : fa6
Egress Monitor Destination P rt : fa6
Ingress Source Po ts :fa1,fa2,
Egress Source Po ts :fa1,fa2,
Event Log
Display Switch# show event-log
<1>Jan 1 02:50:47 snmpd[101]: Event: Link 4 Down.
<2>Jan 1 02:50:50 snmpd[101]: Event: Link 5 Up.
<3>Jan 1 02:50:51 snmpd[101]: Event: Link 5 Down.
<4>Jan 1 02:50:53 snmpd[101]: Event: Link 4 Up.
Topology Discovery (LLDP)
Enable LLDP Switch(config)# lldp
holdtime Specify the holdtime of LLDP in seconds
run Enable LLDP
timer Set the transmission frequency of LLDP in
seconds
Switch(config)# lldp run
LLDP is enabled!
Change LLDP timer Switch(config)# lldp holdtime
<10-255> Valid range is 10~255
Switch(config)# lldp timer
<5-254> Valid range is 5~254
Ping
Ping IP Switch# ping 192.168.10.33
PING 192.168.10.33 (192.168.10.33): 56 data bytes
64 bytes from 192.168.10.33: icmp_seq=0 ttl=128 time=0.0 ms
64 bytes from 192.168.10.33: icmp_seq=1 ttl=128 time=0.0 ms
64 bytes from 192.168.10.33: icmp_seq=2 ttl=128 time=0.0 ms
64 bytes from 192.168.10.33: icmp_seq=3 ttl=128 time=0.0 ms
64 bytes from 192.168.10.33: icmp_seq=4 ttl=128 time=0.0 ms
138
4.13 Device Front Panel
Device Front Panel command allows you to see LED status of the switch. You can see
LED and link status of the Power, DO, DI, R.M. and Ports.
139
4.14 Save to Flash
Save Configuration allows you to save any configuration you just made to the Flash.
Powering off the switch without clicking on Save Configuration will cause loss of new
settings. After selecting Save Configuration, click on Save to Flash to save your new
configuration.
After saved the configuration successfully, the popup window appears to show Save
configuration to flash ok.
Command Lines:
140
4.15 Logout
The switch provides 2 logout methods. The web connection will be logged out if you don’t
input any command after 30 seconds. The Logout command allows you to manually logout
the web connection. Click on Yes to logout, No to go back the configuration page.
Command Lines:
SWITCH# exit
141
5 Appendix
5.1 Pin Assignment of the RS-232 Console Cable
The total cable length is 150cm.
142
5.2 Korenix SFP family
Korenix certificated many types of SFP transceiver. These certificated SFP transceivers
can be identified by JetNet 5428G and displayed in the UI. The SFP transceivers we
certificated can meet up the industrial critical environment needs. We recommend you to
use Korenix certificated SFP transceivers when you constructing your network.
Korenix will keep on certificating and updating the certificated SFP transceivers in
Korenix web site and purchase list. You can refer to the web site to get the latest
information about SFP transceivers.
Note: Poor SFP transceivers may result in poor network performance or can’t meet up
claimed distance or temperature.
143
5.3 Korenix Private MIB
Korenix provides many standard MIBs for users to configure or monitor the switch’s
configuration by SNMP. But, since some commands can’t be found in standard MIB,
Korenix provides Private MIB to meet up the need. Compile the private MIB file by your
SNMP tool. You can then use it. Private MIB can be found in product CD or downloaded
from Korenix Web site.
Private MIB tree is similar to the web tree. This is easier to understand and use. If you
are not familiar with standard MIB, you can directly use private MIB to manage /monitor
the switch, no need to learn or find where the OIDs of the commands are.
Compile the private MIB file and you can see all the MIB tables in MIB browser.
144
5.4 Revision History
145
5.5 About Korenix
Less Time At Work! Fewer Budget on applications!
The Korenix business idea is to let you spend less time at work and fewer budget on
your applications. Do you really want to go through all the troubles but still end up with
low quality products and lousy services? Definitely not! This is why you need Korenix.
Korenix offers complete product selection that fulfills all your needs for applications. We
provide easier, faster, tailor-made services, and more reliable solutions. In Korenix,
there is no need to compromise. Korenix takes care of everything for you!
Fusion of Outstandings
You can end your searching here. Korenix Technology is your one-stop supply center
for industrial communications and networking products. Korenix Technology is
established by a group of professionals with more than 10 year experience in the arenas
of industrial control, data communications and industrial networking applications.
Korenix Technology is well-positioned to fulfill your needs and demands by providing a
great variety of tailor-made products and services. Korenix’s industrial-grade products
also come with quality services. No more searching, and no more worries. Korenix
Technology stands by you all the way through.
Quality Services
KoreCARE--- KoreCARE is Korenix Technology’s global service center, where our
professional staffs are ready to solve your problems at any time and in real-time. All of
Korenix’s products have passed ISO-9000/EMI/CE/FCC/UL certifications, fully satisfying
your demands for product quality under critical industrial environments. Korenix global
service center’s e-mail is koreCARE@korenix.com
5 Years Warranty
Each of Korenix’s product line is designed, produced, and tested with high industrial
standard. Korenix warrants that the Product(s) shall be free from defects in materials
and workmanship for a period of five (5) years from the date of delivery provided that the
Product was properly installed and used. This warranty is voided if defects, malfunctions
or failures of the warranted Product are caused by damage resulting from force measure
(such as floods, fire, etc.), environmental and atmospheric disturbances, other external
forces such as power line disturbances, host computer malfunction, plugging the board
in under power, or incorrect cabling; or the warranted Product is misused, abused, or
operated, altered and repaired in an unauthorized or improper way
146